Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-41050
HistorySep 06, 2023 - 5:58 p.m.

CVE-2023-41050 Information disclosure through Python's "format" functionality in Zope AccessControl

2023-09-0617:58:10
CWE-200
GitHub_M
www.cve.org
cve-2023-41050
information disclosure
python
zope accesscontrol
accesscontrol
vulnerability
information disclosure
security
fix
upgrade
untrusted users

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

18.2%

AccessControl provides a general security framework for use in Zope. Python’s “format” functionality allows someone controlling the format string to “read” objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python’s full blown getattr and getitem, not the policy restricted AccessControl variants _getattr_ and _getitem_. This can lead to critical information disclosure. AccessControl already provides a safe variant for str.format and denies access to string.Formatter. However, str.format_map is still unsafe. Affected are all users who allow untrusted users to create AccessControl controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "zopefoundation",
    "product": "AccessControl",
    "versions": [
      {
        "version": "AccessControl: < 4.4",
        "status": "affected"
      },
      {
        "version": "AccessControl: >= 5.0, < 5.8",
        "status": "affected"
      },
      {
        "version": "AccessControl: >= 6.0, < 6.2",
        "status": "affected"
      },
      {
        "version": "Zope:  < 4.8.9",
        "status": "affected"
      },
      {
        "version": "Zope:  >= 5.0.0, < 5.8.4",
        "status": "affected"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

18.2%

Related for CVELIST:CVE-2023-41050