Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/2217 | vdb entry |
http://secunia.com/advisories/36204 | third party advisory vendor advisory |
http://osvdb.org/56826 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/52379 | vdb entry |
http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2 | patch vendor advisory |
http://secunia.com/advisories/36205 | third party advisory vendor advisory |
http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html | mailing list |
http://www.securityfocus.com/bid/35987 | vdb entry |