SB2018100323 - Input validation error in Zope
Published: October 3, 2018 Updated: June 17, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2006-3458)
The vulnerability allows a local user to gain access to sensitive information.
Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files.
Remediation
Install update from vendor's website.
References
- http://mail.zope.org/pipermail/zope-announce/2006-July/001984.html
- http://secunia.com/advisories/20988
- http://secunia.com/advisories/21025
- http://secunia.com/advisories/21130
- http://secunia.com/advisories/21459
- http://www.debian.org/security/2006/dsa-1113
- http://www.novell.com/linux/security/advisories/2006_19_sr.html
- http://www.securityfocus.com/bid/18856
- http://www.vupen.com/english/advisories/2006/2681
- http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-20060705/README.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27636
- https://usn.ubuntu.com/317-1/