CVE-2000-0062:
Zope DTML implementation Improper Authentication
10
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/30/2022
Updated
9/18/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zope | pip | >= 2.2.0, <= 2.2.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability information describes an authentication bypass in Zope's DTML implementation but does not include specific code references, commit diffs, or technical details about the flawed functions. While the vulnerability (CWE-287) suggests missing authentication checks in DTML processing logic, the advisory lacks concrete evidence such as function names, file paths, or code snippets to pinpoint exact vulnerable functions. Historical Zope DTML vulnerabilities often relate to improper input validation in template evaluation (e.g., via tags like <dtml-var> or <dtml-call>), but without explicit confirmation from patch details or exploit analysis, identifying specific functions with high confidence is not possible.