GHSA-3g43-xfrw-pv5m

Suggest an improvement
Source
https://github.com/advisories/GHSA-3g43-xfrw-pv5m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-3g43-xfrw-pv5m/GHSA-3g43-xfrw-pv5m.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3g43-xfrw-pv5m
Published
2024-05-15T21:34:59Z
Modified
2024-11-29T05:40:30.571945Z
Summary
eZ Platform User data disclosure
Details

In eZ Platform v2.3.x it is possible to bypass permission checks in a particular case. This means user data such as name and email (but not passwords or password hashes) can be read by unauthenticated users. This affects only v2.3.x. If you use v2.2.x or older you are not affected.

To install, use Composer to update "ezsystems/repository-forms" to the "Resolving versions" mentioned above, or apply this patch manually: https://github.com/ezsystems/repository-forms/commit/ea82e136ec1ea40aca714abb79cc8e5bfece01e8

Have you found a security bug in eZ Publish or eZ Platform? See how to report it responsibly here: https://doc.ez.no/Security

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-15T21:34:59Z"
}
References

Affected packages

Packagist / ezsystems/repository-forms

Package

Name
ezsystems/repository-forms
Purl
pkg:composer/ezsystems/repository-forms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
2.3.2.1

Affected versions

v2.*

v2.3.0
v2.3.1
v2.3.2