First published: Mon Apr 22 2002(Updated: )
Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/zope | >=2.5.0<2.5.1 | 2.5.1 |
pip/zope | >=2.2.0<2.4.4 | 2.4.4 |
Zope ZODB | =2.2.0 | |
Zope ZODB | =2.2.1 | |
Zope ZODB | =2.2.2 | |
Zope ZODB | =2.2.3 | |
Zope ZODB | =2.2.4 | |
Zope ZODB | =2.2.5 | |
Zope ZODB | =2.3.0 | |
Zope ZODB | =2.3.1 | |
Zope ZODB | =2.3.2 | |
Zope ZODB | =2.3.3 | |
Zope ZODB | =2.4.0 | |
Zope ZODB | =2.4.1 | |
Zope ZODB | =2.4.2 | |
Zope ZODB | =2.4.3 | |
Zope ZODB | =2.4.4b1 | |
Zope ZODB | =2.5.0 | |
Zope ZODB | =2.5.1b1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0170 is considered a high severity vulnerability due to the potential for unauthorized access to sensitive documents.
To fix CVE-2002-0170, you should upgrade Zope to version 2.5.2 or later, which includes the necessary patches.
CVE-2002-0170 affects Zope versions 2.2.0 through 2.5.1.
Failing to address CVE-2002-0170 could lead to unauthorized users gaining access to restricted documents and potentially sensitive information.
While upgrading is the recommended course of action, temporarily restricting user access until the software is updated can act as a mitigative measure.