Miggo Logo

GHSA-9wwx-c723-vm8x:
eZ Platform REST API returns list of all SiteAccesses

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
ezsystems/ezpublish-kernelcomposer>= 7.3.0, < 7.3.2.17.3.2.1
ezsystems/ezpublish-kernelcomposer>= 7.0.0, < 7.2.4.17.2.4.1
ezsystems/ezpublish-kernelcomposer>= 6.8.0, < 6.13.5.16.13.5.1
ezsystems/ezpublish-kernelcomposer>= 6.0.0, < 6.7.9.16.7.9.1
ezsystems/ezpublish-kernelcomposer>= 5.4.0, < 5.4.13.15.4.13.1
ezsystems/ezpublish-kernelcomposer>= 5.3.0, < 5.3.12.15.3.12.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from error messages disclosing all SiteAccess names when invalid input is provided. The patch introduces a debug flag to conditionally include this sensitive information. The core issue occurs in the exception-throwing functions:

  1. Router::match() handles X-Siteaccess header validation and previously always included the SiteAccess list in error messages.
  2. ConsoleCommandListener::onConsoleCommand() performed similar disclosure for CLI commands. Both functions passed the full SiteAccess list to InvalidSiteAccessException constructor without debug checks prior to the patch, making them the direct sources of information leakage.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T*is s**urity **visory *ix*s * vuln*r**ility in *Z Pl*t*orm, *n* w* r**omm*n* t**t you inst*ll it *s soon *s possi*l*. T** issu* is t**t t** R*ST *PI m*y ** m*** to *is*los* t** n*m*s o* *ll *v*il**l* sit* ****ss*s. T** s*v*rity o* t*is **p*n*s on yo

Reasoning

T** vuln*r**ility st*ms *rom *rror m*ss***s *is*losin* *ll Sit*****ss n*m*s w**n inv*li* input is provi***. T** p*t** intro*u**s * ***u* *l** to *on*ition*lly in*lu** t*is s*nsitiv* in*orm*tion. T** *or* issu* o**urs in t** *x**ption-t*rowin* *un*tio