First published: Tue Sep 08 2009(Updated: )
Unspecified vulnerability in the Zope Enterprise Objects (ZEO) storage-server functionality in Zope Object Database (ZODB) 3.8 before 3.8.3 and 3.9.x before 3.9.0c2, when certain ZEO database sharing and blob support are enabled, allows remote authenticated users to read or delete arbitrary files via unknown vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/zodb3 | >=3.9a0<3.9.0c2 | 3.9.0c2 |
pip/zodb3 | >=3.8<3.8.3 | 3.8.3 |
Zope ZODB | =3.9.0 | |
Zope ZODB | =3.8.2 | |
Zope ZODB | =3.9.0b5 | |
Zope ZODB | =3.8.0 | |
Zope ZODB | =3.9.0b1 | |
Zope ZODB | =3.9.0b3 | |
Zope ZODB | =3.8 | |
Zope ZODB | =3.9.0c1 | |
Zope ZODB | =3.9.0b4 | |
Zope ZODB | =3.8.1 | |
Zope ZODB | =3.9.0b2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2701 has a medium severity level due to the potential for remote authenticated users to read or delete arbitrary files.
To fix CVE-2009-2701, upgrade Zope Object Database (ZODB) to version 3.8.3 or 3.9.0c2.
CVE-2009-2701 affects ZODB versions 3.8.0 to 3.8.2 and 3.9.0b1 to 3.9.0b5.
Remote authenticated users of affected ZODB versions are impacted by CVE-2009-2701.
CVE-2009-2701 exploits the ZEO storage-server functionality when specific database sharing and blob support is enabled.