An issue was discovered in eZ Platform Ibexa Kernel before 1.3.19. It allows determining account existence via a timing attack.
{
"versions": [
{
"introduced": "2.5.0"
},
{
"fixed": "2.5.13"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"fixed": "2.5.30"
},
{
"introduced": "3.0.0"
},
{
"fixed": "3.0.2"
}
]
}{
"versions": [
{
"introduced": "3.3.0"
},
{
"fixed": "3.3.18"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.7"
},
{
"introduced": "4.1.0"
},
{
"fixed": "4.1.4"
},
{
"introduced": "3.3.0"
},
{
"fixed": "3.3.20"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.7"
},
{
"introduced": "4.1.0"
},
{
"fixed": "4.1.4"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.7"
},
{
"introduced": "4.1.0"
},
{
"fixed": "4.1.4"
}
]
}[
{
"events": [
{
"introduced": "1.3.0"
},
{
"fixed": "1.3.27"
}
]
},
{
"events": [
{
"introduced": "2.3.0"
},
{
"fixed": "2.3.19"
}
]
},
{
"events": [
{
"introduced": "1.3.0"
},
{
"fixed": "1.3.19"
}
]
},
{
"events": [
{
"introduced": "7.5.0"
},
{
"fixed": "7.5.29"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48366.json"