{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T20:38:15.112","vulnerabilities":[{"cve":{"id":"CVE-2021-21360","sourceIdentifier":"security-advisories@github.com","published":"2021-03-09T01:15:13.120","lastModified":"2024-11-21T05:48:11.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `\"Products.GenericSetup>=2.1.1\"`."},{"lang":"es","value":"Products.GenericSetup es un mini framework para expresar el estado configurado de un sitio Zope como un conjunto de artefactos del sistema de archivos.&#xa0;En Products.GenericSetup anterior a versión 2.1.1, se presenta una vulnerabilidad de divulgación de información: los visitantes anónimos pueden visualizar archivos de registro e instantáneas generadas por la Generic Setup Tool.&#xa0;El problema se ha corregido en la versión 2.1.1.&#xa0;Dependiendo de cómo haya instalado Products.GenericSetup, debe cambiar el pin de la versión de compilación a 2.1.1 y volver a ejecutar la compilación, o si usó pip simplemente haga la instalación de pip \"Products.GenericSetup versiones posteriores o iguales a 2.1.1\"`"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zope:products.genericsetup:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.1","matchCriteriaId":"344C85D3-5FB3-4860-B4EC-881E1DC94A20"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2021/05/21/1","source":"security-advisories@github.com","tags":["Mailing List"]},{"url":"http://www.openwall.com/lists/oss-security/2021/05/22/1","source":"security-advisories@github.com","tags":["Mailing List"]},{"url":"https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://pypi.org/project/Products.GenericSetup/","source":"security-advisories@github.com","tags":["Product","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2021/05/21/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"http://www.openwall.com/lists/oss-security/2021/05/22/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://pypi.org/project/Products.GenericSetup/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Third Party Advisory"]}]}}]}