|Title:||Zope Image updating Method|
The remote web server is Zope < 2.2.5
There is a security issue in all releases
prior to version 2.2.5.
The issue involves incorrect protection of a data updating
method on Image and File objects. Because the method is not
correctly protected, it is possible for users with DTML
editing privileges to update the raw data of a File or Image
object via DTML though they do not have editing privileges
on the objects themselves.
*** Nessus solely relied on the version number of your
*** server, so if you applied the hotfix already,
*** consider this alert as a false positive.
Solution : Upgrade to Zope 2.2.5 or apply the hotfix available
Risk factor : High
BugTraq ID: 922|
Common Vulnerability Exposure (CVE) ID: CVE-2000-0062
Bugtraq: 20000104 [email@example.com: [Zope] SECURITY ALERT] (Google Search)
XForce ISS Database: zope-dtml
|Copyright||This script is Copyright (C) 2000 Renaud Deraison|
|This is only one of 74190 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.