GHSA-gv2c-5g79-h73c: Ibexa ezplatform-kernel download route allows filename change
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
11/3/2023
Updated
11/16/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ezsystems/ezplatform-kernel | composer | >= 1.3.0, < 1.3.34 | 1.3.34 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the downloadBinaryFileAction method accepting a user-provided 'filename' parameter. The commit diff shows this parameter was removed from the Content-Disposition header generation and replaced with $field->value->fileName. This indicates the original implementation's direct use of user input for filenames was the root cause. The routing change from redirectToContentDownloadAction to downloadBinaryFileByIdAction further confirms the attack surface was in the original filename handling logic.