Miggo Logo

GHSA-6xch-2vxx-5pvr: eZ Platform Rules to disable executable access are ignored on Platform.sh (eZ Cloud)

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
ezsystems/ezplatformcomposer>= 2.5.0, < 2.5.42.5.4
ezsystems/ezplatformcomposer>= 1.13.0, < 1.13.5.11.13.5.1
ezsystems/ezplatformcomposer>= 1.7.0, < 1.7.9.11.7.9.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing security rules in the Platform.sh configuration (.platform.app.yaml), not from specific code functions. The issue occurs because the web server configuration that blocks executable file access (via Apache/Nginx rewrite rules) was not properly implemented in Platform.sh environments. The fix adds a platform.sh-specific rule configuration but does not modify any application code functions. The vulnerability is configuration-related rather than stemming from insecure code functions. There are no specific PHP functions in the application codebase that can be identified as vulnerable based on the provided information.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** r**omm*n*** *p****/N*inx virtu*l *ost *on*i*ur*tion *or *Z Pl*t*orm in*lu**s * r*writ* rul* *or *lo*kin* ****ss to *x**ut**l* *il*s in t** v*r *ir**tory. T*is rul* *o*s not work w**n usin* *Z Pl*t*orm *lou* (i.*. runnin* *Z Pl*t*orm on t** Pl*t*o

Reasoning

T** vuln*r**ility st*ms *rom missin* s**urity rul*s in t** `Pl*t*orm.s*` *on*i*ur*tion (.pl*t*orm.*pp.y*ml), not *rom sp**i*i* *o** *un*tions. T** issu* o**urs ****us* t** w** s*rv*r *on*i*ur*tion t**t *lo*ks *x**ut**l* *il* ****ss (vi* *p****/N*inx