CVE-2002-0170 (GCVE-0-2002-0170)
Vulnerability from cvelistv5 – Published: 2003-04-02 05:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:42:28.134Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020301 [matt@zope.com: [Zope-Annce] Zope Hotfix 2002-03-01 (Ownership Roles Enforcement)]",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101503023511996\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.zope.org/Products/Zope/hotfixes/"
},
{
"name": "4229",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4229"
},
{
"name": "RHSA-2002:060",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-060.html"
},
{
"name": "zope-proxy-role-privileges(8334)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8334.php"
},
{
"name": "5350",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/5350"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-03-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-03-20T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020301 [matt@zope.com: [Zope-Annce] Zope Hotfix 2002-03-01 (Ownership Roles Enforcement)]",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101503023511996\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.zope.org/Products/Zope/hotfixes/"
},
{
"name": "4229",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4229"
},
{
"name": "RHSA-2002:060",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-060.html"
},
{
"name": "zope-proxy-role-privileges(8334)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8334.php"
},
{
"name": "5350",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/5350"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0170",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020301 [matt@zope.com: [Zope-Annce] Zope Hotfix 2002-03-01 (Ownership Roles Enforcement)]",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101503023511996\u0026w=2"
},
{
"name": "http://www.zope.org/Products/Zope/hotfixes/",
"refsource": "CONFIRM",
"url": "http://www.zope.org/Products/Zope/hotfixes/"
},
{
"name": "4229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4229"
},
{
"name": "RHSA-2002:060",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-060.html"
},
{
"name": "zope-proxy-role-privileges(8334)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8334.php"
},
{
"name": "5350",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/5350"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0170",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-04-11T00:00:00",
"dateUpdated": "2024-08-08T02:42:28.134Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2002-0170\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-04-22T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration.\"},{\"lang\":\"es\",\"value\":\"Zope 2.2.0 a 2.5.1 no verifica adecuamente el acceso a objetos con perfiles del proxy, lo que podr\u00eda permitir a algunos usuarios acceder a documentos violando la configuraci\u00f3n pretendida.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3C0DAC-01B0-4C9D-9AA2-8F02F974DCFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A13ABF-9850-4AB8-A0C9-8D6B9F3D9862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B80335-5F59-4530-A241-437367369BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53427D40-495B-4F37-95A5-6D069186CBB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB2FC39-A95D-414E-A67E-66AF79A12CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"925BC42D-02B5-4B6F-ADC6-156407868276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DE8A9F-432B-40C3-9A7E-3472E2AF0131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B34354C-3369-4926-9DFC-44608A1BC82E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"143AD011-2D33-43E1-AFEA-7C1BC96CBDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56D73A2B-7D4B-43BA-B7D7-E1FE397BD577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54DFA87E-DC83-40A8-AAC1-40B37F024255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4701F71F-D467-4C9E-8819-9E4361AB1C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89A37024-4562-451B-B1C0-CD27DD694F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6881C300-3639-4B31-8182-C9DACE3F4E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.4.4b1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D58B127-6410-4D56-9ACA-A453C64ACD2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"219AC292-9793-4FA6-A6E8-9E6D922AFC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zope:zope:2.5.1b1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F42437-4591-4E5C-8AF2-C8EF6BCB694C\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=101503023511996\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/8334.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/5350\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-060.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/4229\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.zope.org/Products/Zope/hotfixes/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=101503023511996\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/8334.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/5350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-060.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/4229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.zope.org/Products/Zope/hotfixes/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…