First published: Wed Oct 04 2023(Updated: )
### Impact The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) because the title property is displayed unquoted in the breadcrumbs element. All versions of Zope 4 and Zope 5 are affected. ### Patches Patches will be released with Zope versions 4.8.11 and 5.8.6. ### Workarounds Make sure only Manager users can edit and view Zope objects in the Zope Management Interface. This is the default.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Zope | >=4.0.0<4.8.11 | 4.8.11 |
pip/Zope | >=5.0.0<5.8.6 | 5.8.6 |
Zope Zope | >=4.0<4.8.11 | |
Zope Zope | >=5.0<5.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-44389.
The title property in Zope can be used to store script code that is executed in the Zope Management Interface (ZMI).
All versions of Zope 4 and Zope 5 are affected.
The severity of CVE-2023-44389 is low with a CVSS score of 3.1.
You can find more information about CVE-2023-44389 in the following references: [link](https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh), [link](https://github.com/zopefoundation/Zope/commit/21dfa78609ffd8b6bd8143805678ebbacae5141a), [link](https://github.com/zopefoundation/Zope/commit/aeaf2cdc80dff60815e3706af448f086ddc3b98d).