CVE-2023-41050

AccessControl provides a general security framework for use in Zope. Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zope:accesscontrol:*:*:*:*:*:*:*:*
cpe:2.3:a:zope:accesscontrol:*:*:*:*:*:*:*:*
cpe:2.3:a:zope:accesscontrol:*:*:*:*:*:*:*:*
cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*
cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:20

Type Values Removed Values Added
References () https://github.com/zopefoundation/AccessControl/commit/6bc32692e0d4b8d5cf64eae3d19de987c7375bc9 - Patch () https://github.com/zopefoundation/AccessControl/commit/6bc32692e0d4b8d5cf64eae3d19de987c7375bc9 - Patch
References () https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c - Vendor Advisory () https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c - Vendor Advisory
CVSS v2 : unknown
v3 : 7.7
v2 : unknown
v3 : 6.8

13 Sep 2023, 02:47

Type Values Removed Values Added
CPE cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*
cpe:2.3:a:zope:accesscontrol:*:*:*:*:*:*:*:*
References (MISC) https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c - (MISC) https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c - Vendor Advisory
References (MISC) https://github.com/zopefoundation/AccessControl/commit/6bc32692e0d4b8d5cf64eae3d19de987c7375bc9 - (MISC) https://github.com/zopefoundation/AccessControl/commit/6bc32692e0d4b8d5cf64eae3d19de987c7375bc9 - Patch
First Time Zope
Zope zope
Zope accesscontrol
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.7

06 Sep 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-06 18:15

Updated : 2024-11-21 08:20


NVD link : CVE-2023-41050

Mitre link : CVE-2023-41050

CVE.ORG link : CVE-2023-41050


JSON object : View

Products Affected

zope

  • zope
  • accesscontrol
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor