Lucene search

K
nvd[email protected]NVD:CVE-2023-41050
HistorySep 06, 2023 - 6:15 p.m.

CVE-2023-41050

2023-09-0618:15:08
CWE-200
web.nvd.nist.gov
accesscontrol
zope
python
format
security
vulnerability
code execution

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.2%

AccessControl provides a general security framework for use in Zope. Python’s “format” functionality allows someone controlling the format string to “read” objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python’s full blown getattr and getitem, not the policy restricted AccessControl variants _getattr_ and _getitem_. This can lead to critical information disclosure. AccessControl already provides a safe variant for str.format and denies access to string.Formatter. However, str.format_map is still unsafe. Affected are all users who allow untrusted users to create AccessControl controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

NVD
Node
zopeaccesscontrolRange<4.4
OR
zopeaccesscontrolRange5.05.8
OR
zopeaccesscontrolRange6.06.2
OR
zopezopeRange<4.8.9
OR
zopezopeRange5.05.8.4

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.2%