Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. ezsystems/repository-forms
  4. ›
  5. GHSA-3g43-xfrw-pv5m

GHSA-3g43-xfrw-pv5m: eZ Platform User data disclosure

May 15, 2024

In eZ Platform v2.3.x it is possible to bypass permission checks in a particular case. This means user data such as name and email (but not passwords or password hashes) can be read by unauthenticated users. This affects only v2.3.x. If you use v2.2.x or older you are not affected.

To install, use Composer to update “ezsystems/repository-forms” to the “Resolving versions” mentioned above, or apply this patch manually: https://github.com/ezsystems/repository-forms/commit/ea82e136ec1ea40aca714abb79cc8e5bfece01e8

Have you found a security bug in eZ Publish or eZ Platform? See how to report it responsibly here: https://doc.ez.no/Security

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/ezsystems/repository-forms/2018-11-20-1.yaml
  • github.com/advisories/GHSA-3g43-xfrw-pv5m
  • github.com/ezsystems/repository-forms
  • github.com/ezsystems/repository-forms/commit/ea82e136ec1ea40aca714abb79cc8e5bfece01e8
  • web.archive.org/web/20210614184249/http://share.ez.no/community-project/security-advisories/ezsa-2018-007-user-data-disclosure

Code Behaviors & Features

Detect and mitigate GHSA-3g43-xfrw-pv5m with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.3.0 before 2.3.2.1

Fixed versions

  • 2.3.2.1

Solution

Upgrade to version 2.3.2.1 or above.

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

packagist/ezsystems/repository-forms/GHSA-3g43-xfrw-pv5m.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:48 +0000.