Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Debian Security Advisory DSA 1113-1 (zope2.7)
Information
Severity
Severity
Low
Family
Family
Debian Local Security Checks
CVSSv2 Base
CVSSv2 Base
2.1
CVSSv2 Vector
CVSSv2 Vector
AV:L/AC:L/Au:N/C:P/I:N/A:N
Solution Type
Solution Type
Vendor Patch
Created
Created
16 years ago
Modified
Modified
6 years ago
Summary
The remote host is missing an update to zope2.7 announced via advisory DSA 1113-1. It was discovered that the Zope web application server allows read access to arbitrary pages on the server, if a user has the privilege to edit restructured text pages.
Solution
Solution
For the stable distribution (sarge) this problem has been fixed in version 2.7.5-2sarge2. The unstable distribution (sid) does no longer contain Zope 2.7 packages. We recommend that you upgrade your zope2.7 package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201113-1