A vulnerability has been discovered in the LDAPUserFolder product for Zope, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error within the "authenticate()" function in Products/LDAPUserFolder/LDAPUserFolder.py, which does not properly verify the password provided for the emergency user. This can be exploited to gain access to certain pages of the LDAPUserFolder product by providing an arbitrary password. The vulnerability is confirmed in version 2.18. Other versions may also be affected. Please note that an ancient version of this package (2.4) is marked stable on x86.
@net-zope, thoughts? I could not find a fixed version from the upstream, but there appears to be a one-line fix in the debian bug http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=593466.
Vulnerable ebuilds have been removed from the tree.
Please don't close security bugs. Fixed in 2.20 according to http://pypi.python.org/pypi/Products.LDAPUserFolder#id1.