First published: Tue Sep 19 2006(Updated: )
The docutils module in Zope (Zope2) 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8 does not properly handle web pages with reStructuredText (reST) markup, which allows remote attackers to read arbitrary files via a csv_table directive, a different vulnerability than CVE-2006-3458.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/zope2 | >=2.8.0<2.8.9 | 2.8.9 |
pip/zope2 | >=2.7.0<=2.7.9 | |
Zope ZODB | =2.7.0 | |
Zope ZODB | =2.7.1 | |
Zope ZODB | =2.7.2 | |
Zope ZODB | =2.7.3 | |
Zope ZODB | =2.7.4 | |
Zope ZODB | =2.7.5 | |
Zope ZODB | =2.7.6 | |
Zope ZODB | =2.7.7 | |
Zope ZODB | =2.7.8 | |
Zope ZODB | =2.7.9 | |
Zope ZODB | =2.8.0 | |
Zope ZODB | =2.8.1 | |
Zope ZODB | =2.8.2 | |
Zope ZODB | =2.8.3 | |
Zope ZODB | =2.8.4 | |
Zope ZODB | =2.8.5 | |
Zope ZODB | =2.8.6 | |
Zope ZODB | =2.8.7 | |
Zope ZODB | =2.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4684 has a moderate severity level as it allows remote attackers to read arbitrary files.
To fix CVE-2006-4684, you should upgrade to Zope version 2.8.9 or later.
CVE-2006-4684 affects Zope versions 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8.
Yes, CVE-2006-4684 can lead to data exposure as it allows attackers to access arbitrary files on the server.
The exploit method for CVE-2006-4684 involves using the csv_table directive in web pages with reStructuredText markup.