Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
https://exchange.xforce.ibmcloud.com/vulnerabilities/52379
http://www.vupen.com/english/advisories/2009/2217
http://www.securityfocus.com/bid/35987
http://secunia.com/advisories/36205
http://secunia.com/advisories/36204
http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2
http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html
Published: 2009-08-07
Updated: 2025-04-09
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High
Base Score: 8.7
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:L/SI:L/SA:N
Severity: High
EPSS: 0.0055