{"id":"CVE-2021-32807","details":"The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope \"Manager\" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. The problem has been fixed in AccessControl 4.3 and 5.2. Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7. As a workaround, a site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.","aliases":["CVE-2021-32811","GHSA-g4gq-j4p2-j8fr","GHSA-qcx9-j53g-ccgf","PYSEC-2021-335","PYSEC-2021-368","PYSEC-2021-370","PYSEC-2021-875"],"modified":"2026-03-13T22:15:49.900521Z","published":"2021-07-30T22:15:07.967Z","related":["GHSA-qcx9-j53g-ccgf"],"references":[{"type":"ADVISORY","url":"https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30"},{"type":"ADVISORY","url":"https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf"},{"type":"FIX","url":"https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zopefoundation/accesscontrol","events":[{"introduced":"4acebba0ffe57e020c847acd84eed276dd9e1696"},{"fixed":"f11416f52e5a09a521312ea20e78bbb17c7bf647"},{"introduced":"b0123dcf9ed672444ef2b53802df2f48602fe60b"},{"fixed":"e4fa02fd6f624283ec586d15d25230fc241d361d"},{"fixed":"b42dd4badf803bb9fb71ac34cd9cb0c249262f2c"}],"database_specific":{"versions":[{"introduced":"4.0"},{"fixed":"4.3"},{"introduced":"5.0"},{"fixed":"5.2"}]}}],"versions":["4.0","4.1","4.2","5.0","5.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32807.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}