Miggo Logo

CVE-2009-0669: Zope Object Database (ZODB) Authentication bypass in ZEO storage servers

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.6698%
Published
5/2/2022
Updated
11/19/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
ZODB3pip< 3.8.23.8.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper authentication in the ZEO network protocol. The ZEO storage server's handshake process (handle_zeo_handshake) is the critical point where client authentication is negotiated. Pre-3.8.2 versions lacked proper validation of authentication credentials during this phase, as evidenced by the CWE-287 classification and the advisory's focus on ZEO protocol vectors. The function's role in the authentication workflow and the patched version's requirement (3.8.2) strongly indicate this as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Zop* O*j**t **t***s* (ZO**) ***or* *.*.*, w**n **rt*in Zop* *nt*rpris* O*j**ts (Z*O) **t***s* s**rin* is *n**l**, *llows r*mot* *tt**k*rs to *yp*ss *ut**nti**tion vi* v**tors involvin* t** Z*O n*twork proto*ol.

Reasoning

T** vuln*r**ility st*ms *rom improp*r *ut**nti**tion in t** Z*O n*twork proto*ol. T** Z*O stor*** s*rv*r's **n*s**k* pro**ss (**n*l*_z*o_**n*s**k*) is t** *riti**l point w**r* *li*nt *ut**nti**tion is n**oti*t**. Pr*-*.*.* v*rsions l**k** prop*r v*li