After reviewing the docutils / reStructuredText integration in Zope 2, we have discovered that versions 2.7.0 - 2.7.8 and 2.8.0 - 2.8.8 are vulnerable to a further information disclosure exploit.

Overview

This hotfix removes the exploit by disabling the reStructuredText feature which exposes the vulnerability. This vulnerability has been fixed on the 2.8 branch, and will thus not be present in any future release from that branch (2.8.9 or later).

Zope2 versions from 2.9 and the trunk are not vulnerable to this exploit.

Note that this hotfix fixes a problem not attressed by the earlier reStructuredText integration hotfix ; that hotfix needs to remain installed until after upgrading to a fixed version of Zope.
Hotfix

We have prepared a hot fix for this problem at:

http://www.zope.org/Products/Zope/Hotfix-2006-08-21/Hotfix-20060821/.

This hotfix should be installed as soon as possible.

To install, simply extract the archive into your Products directory in your Zope installation.

See: http://www.zope.org/Products/Zope/Hotfix-2006-08-21/ Hotfix-20060821/README.txt,

for installation instructions.

It is important to install this hotfix as soon as possible.

This fix will disable the reStructuredText csv-table directive.

Jim

--
Jim Fulton                      mailto:[EMAIL PROTECTED]                Python 
Powered!
CTO                             (540) 361-1714                  
http://www.python.org
Zope Corporation        http://www.zope.com             http://www.zope.org



_______________________________________________
Zope-Announce maillist  -  Zope-Announce@zope.org
http://mail.zope.org/mailman/listinfo/zope-announce

 Zope-Announce for Announcements only - no discussions

(Related lists - Users: http://mail.zope.org/mailman/listinfo/zope
Developers: http://mail.zope.org/mailman/listinfo/zope-dev )

Reply via email to