GHSA-cg84-55jx-4237

Suggest an improvement
Source
https://github.com/advisories/GHSA-cg84-55jx-4237
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-cg84-55jx-4237/GHSA-cg84-55jx-4237.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cg84-55jx-4237
Published
2024-05-15T21:12:59Z
Modified
2024-11-29T05:40:55.015648Z
Summary
eZ Platform Password reset vulnerability
Details

This Security Update fixes a severe vulnerability in the eZ Platform Admin UI, and we recommend that you install it as soon as possible. It affects eZ Platform 2.x.

The functionality for resetting a forgotten password is vulnerable to brute force attack. Depending on configuration and other circumstances an attacker may exploit this to gain control over user accounts. The update ensures such an attack is exceedingly unlikely to succeed.

You may want to consider a configuration change to further strengthen your security. By default a password reset request is valid for 1 hour. Reducing this time will make attacks even more difficult, but ensure there is enough time left to account for email delivery delays, and user delays. See documentation at https://doc.ezplatform.com/en/latest/guide/user_management/#changing-and-recovering-passwords

To install, use Composer to update to one of the "Resolving versions" mentioned above. If you use eZ Platform 2.5, update ezsystems/ezplatform-user to v1.0.1. If you use eZ Platform 2.4, update ezsystems/ezplatform-admin-ui to v1.4.6, and ezsystems/ezplatform-admin-ui-modules to v1.4.4, and ezsystems/repository-forms to v2.4.5)

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-307"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-15T21:12:59Z"
}
References

Affected packages

Packagist / ezsystems/ezplatform-admin-ui

Package

Name
ezsystems/ezplatform-admin-ui
Purl
pkg:composer/ezsystems/ezplatform-admin-ui

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.4.0
Fixed
1.4.6

Affected versions

v1.*

v1.4.0
v1.4.1
v1.4.2
v1.4.3-rc1
v1.4.3
v1.4.4
v1.4.5