[Zope-Annce] CVE-2009-0668 and CVE-2009-0669: Releases to fix ZODB ZEO server vulnerabilities

Jim Fulton jim at zope.com
Thu Aug 6 08:01:09 EDT 2009

Vulnerabilities have been found in the Zope Object Database (ZODB)
Zope Enterprise Objects (ZEO) network protocol that allow:

  CVE-2009-0668 Arbitrary Python code execution in ZODB ZEO storage servers
  CVE-2009-0669 Authentication bypass in ZODB ZEO storage servers

The vulnerabilities only apply if you are using ZEO to share a
database among multiple applications or application instances and if
untrusted clients are able to connect to your ZEO servers.

The first vulnerability (CVE-2009-0668) was introduced in ZODB 3.3
(Zope 2.8).  The second vulnerability (CVE-2009-0669) was introduced
in ZODB 3.2 (Zope 2.7).


These vulnerabilities are addressed by updates to ZODB.  Newer
releases of Zope are also being provided for people who get ZODB with Zope

A new release of ZODB is available here:


  (There is also a new development release at

New Zope releases that include the fixes can be found here:


We recommend updating any ZEO storoage servers you're running to ZODB
3.8.2 (or ZODB 3.9.0b5) or to ZODB software provided with the Zope
releases listed above.  These versions support ZEO clients as old as
ZODB 3.2. It isn't necessary to update client software (such as Zope
application servers).

Restricting access to ZEO storage servers

It is very important to restrict write access to ZODB databases.  These
releases only protect against vulnerabilities in the ZEO network
protocol. ZODB uses Python pickles to store data. Loading data from
the database can cause arbitrary code to be executed as part of object
deserialization.  Clients have full access to manipulate database
data.  For this reason, it is very important that only trusted clients
be allowed to write to ZODB databases.


Jim Fulton

More information about the Zope-Announce mailing list