Vulnerability Name:

CVE-2000-1211 (CCN-5824)

Assigned:2000-12-16
Published:2000-12-16
Updated:2008-09-05
Summary:Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-01-06
zope vulnerability allows escalation of privileges

Source: CCN
Type: BugTraq Mailing List, Fri Dec 22 2000 - 02:26:37 CST
Zope DTML Role Issue

Source: MITRE
Type: CNA
CVE-2000-1211

Source: CCN
Type: RHSA-2000-125
New Zope packages are available.

Source: XF
Type: UNKNOWN
zope-legacy-names(5824)

Source: MANDRAKE
Type: Patch, Vendor Advisory
MDKSA-2000:083

Source: OSVDB
Type: UNKNOWN
6282

Source: CCN
Type: OSVDB ID: 6282
Zope Legacy Name Authorization Bypass

Source: REDHAT
Type: UNKNOWN
RHSA-2000:125

Source: CCN
Type: Zope.org Web site
News Item: Zope hotfix: constructor alias security

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.zope.org/Products/Zope/Hotfix_2000-12-08/security_alert

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2000:083
Zope

Source: XF
Type: UNKNOWN
zope-legacy-names(5824)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:zope:zope:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.0a1:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.0b1:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.0b2:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.0b3:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.0b4:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.1b1:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:redhat:linux_powertools:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:zope:zope:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    zope zope 2.2.0
    zope zope 2.2.0a1
    zope zope 2.2.0b1
    zope zope 2.2.0b2
    zope zope 2.2.0b3
    zope zope 2.2.0b4
    zope zope 2.2.1
    zope zope 2.2.1b1
    zope zope 2.2.2
    zope zope 2.2.3
    zope zope 2.2.4
    redhat linux powertools 6.1
    mandrakesoft mandrake linux 7.1
    mandrakesoft mandrake linux 7.2
    zope zope 2.2.4
    redhat linux 7.1
    redhat linux 7.2
    redhat linux powertools 6.2
    redhat linux powertools 7.0
    redhat linux 7.3
    freebsd freebsd *
    redhat linux 6.2
    redhat linux 7