CVE-2006-4684: Zope allows remote attackers to read arbitrary files
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71308%
CWE
-
Published
5/1/2022
Updated
11/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
zope2 | pip | >= 2.7.0, <= 2.7.9 | |
zope2 | pip | >= 2.8.0, < 2.8.9 | 2.8.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Zope's integration of docutils' reST parser, which included the csv_table
directive. This directive allows embedding CSV files via the 'file' parameter. Zope's implementation failed to restrict file path access, letting attackers traverse directories. The high-confidence entry points to docutils' CSVTable.run
method, which executes the file read operation. The medium-confidence entry reflects Zope's failure to disable/sanitize this directive in its ReST processing layer, though the exact Zope-side function isn't explicitly named in available sources. The fix involved disabling the directive entirely, confirming its role in the exploit.