Vulnerability Name:

CCN-10222

Published:2002-09-26
Updated:2002-09-26
Summary:Zope could allow a remote attacker to obtain sensitive information. A remote attacker could send a specially-crafted XML-RPC request to Zope, which would cause an error page to be returned containing specific details about the system.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: BugTraq Mailing List, Tue Oct 01 2002 - 08:57:27 CDT
Insecure XML-RPC handling in Zope reveals the distribution physic al location.

Source: CCN
Type: Gentoo Linux Security Announcement
Incorrect handling of XML-RPC requests

Source: CCN
Type: Zope Collectors Site Issue 550
XMLRPC returns no stack trace

Source: CCN
Type: BID-5806
Zope Incorrect XML-RPC Request Information Disclosure Vulnerability

Source: CCN
Type: Zope Web site
Welcome to Zope.org

Source: XF
Type: UNKNOWN
zope-xml-rpc-requests(10222)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:zope:zope:2.5.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    zope zope 2.5.1
    gentoo linux *