First published: Thu Sep 21 2023(Updated: )
### Impact There is a stored cross site scripting vulnerability for SVG images. Note that an image tag with an SVG image as source is never vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an image, and then trick a user into following a specially crafted link. All versions of Zope are impacted on sites that allow untrusted users to upload images. ### Patches Patches will be released in Zope 4.8.10 and 5.8.5. ### Workarounds Make sure the "Add Documents, Images, and Files" permission is only assigned to trusted roles. By default only the Manager has this permission.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zope Zope | <4.8.10 | |
Zope Zope | >=5.0.0<5.8.5 | |
pip/Zope | >=5.8.0<=5.8.4 | 5.8.5 |
pip/Zope | <=4.8.9 | 4.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-42458.
CVE-2023-42458 has a severity rating of 5.4 (medium).
CVE-2023-42458 allows for stored cross site scripting attacks using SVG images.
Versions up to 4.8.10 and 5.8.5 (inclusive) of Zope are affected by CVE-2023-42458.
To fix CVE-2023-42458, update your Zope installation to version 4.8.10 or 5.8.5 (or newer) depending on your current version.