First published: Tue Jul 23 2002(Updated: )
ZCatalog plug-in index support capability for Zope 2.4.0 through 2.5.1 allows anonymous users and untrusted code to bypass access restrictions and call arbitrary methods of catalog indexes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/zope | >=2.4.0<=2.5.1 | 2.6.0 |
Zope ZODB | =2.4.0 | |
Zope ZODB | =2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0688 is considered a critical vulnerability due to the potential for unauthorized access by anonymous users.
To fix CVE-2002-0688, upgrade to Zope version 2.6.0 or later.
CVE-2002-0688 affects Zope versions 2.4.0 through 2.5.1.
CVE-2002-0688 allows malicious users to bypass access restrictions and invoke arbitrary methods on catalog indexes.
Yes, CVE-2002-0688 is a well-documented vulnerability that has been reported in Zope's security advisory.