Skip to content

eZ Publish Legacy Patch EZSA-2018-001 for Several vulnerabilities

High severity GitHub Reviewed Published May 15, 2024 to the GitHub Advisory Database • Updated May 15, 2024

Package

composer ezsystems/ezpublish-legacy (Composer)

Affected versions

>= 2011.0.0, < 2017.12.2.1
>= 5.4.0, < 5.4.11.3
>= 5.3.0, < 5.3.12.3

Patched versions

2017.12.2.1
5.4.11.3
5.3.12.3

Description

This security advisory fixes 4 separate vulnerabilities in eZ Publish Legacy, and we recommend that you install it as soon as possible if you are using Legacy by itself or via the LegacyBridge.

First, it increases the randomness, and thus the security, of the pseudo-random bytes used to generate a hash for the "forgot password" feature. This protects accounts against being taken over through attacks trying to predict the hash. If the increased randomness is not available in your PHP installation, it will now log a warning.

Second, it improves security of the information collector feature, by ensuring no collection emails will be sent from invalid manipulated forms.

Third, it stops the possible leaking of the names of content objects that should not be readable for certain users, on installations where these users can create or edit XML text.

Fourth, it protects against cross-site scripting (XSS) in the Matrix data type, on installations where users are allowed to edit content classes / content types.

We recommend that you install the security update as soon as possible.

To install, use Composer to update to one of the "Resolving versions" mentioned above, or apply these patches manually:
ezsystems/ezpublish-legacy@917711e
ezsystems/ezpublish-legacy@6db0e6b
ezsystems/ezpublish-legacy@efcd2b6
ezsystems/ezpublish-legacy@f9ffaf5

References

Published to the GitHub Advisory Database May 15, 2024
Reviewed May 15, 2024
Last updated May 15, 2024

Severity

High

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-82rv-45pc-v28w
Checking history
See something to contribute? Suggest improvements for this vulnerability.