CVE-2023-44389: Zope management interface vulnerable to stored cross site scripting via the title property
(updated )
The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) because the title property is displayed unquoted in the breadcrumbs element. All versions of Zope 4 and Zope 5 are affected.
References
- github.com/advisories/GHSA-m755-gxxg-r5qh
- github.com/pypa/advisory-database/tree/main/vulns/zope/PYSEC-2023-193.yaml
- github.com/zopefoundation/Zope
- github.com/zopefoundation/Zope/commit/21dfa78609ffd8b6bd8143805678ebbacae5141a
- github.com/zopefoundation/Zope/commit/aeaf2cdc80dff60815e3706af448f086ddc3b98d
- github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh
- nvd.nist.gov/vuln/detail/CVE-2023-44389
Detect and mitigate CVE-2023-44389 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →