GHSA-xwv6-v7qx-f5jc

Suggest an improvement
Source
https://github.com/advisories/GHSA-xwv6-v7qx-f5jc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-xwv6-v7qx-f5jc/GHSA-xwv6-v7qx-f5jc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xwv6-v7qx-f5jc
Aliases
  • CVE-2022-25337
Published
2022-02-19T00:01:25Z
Modified
2023-11-08T04:08:46.354872Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Code injection in ezsystems/ezpublish-kernel
Details

When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible attack vectors are removed from the original file name.

The second issue is that direct access to the images is not access controlled. This is by design, for performance reasons, and documented as such. But it does mean that images not meant to be publicly accessible can be accessed, provided that the image path and filename is correctly deduced and/or guessed, through dictionary attacks and similar.

Database specific
{
    "nvd_published_at": "2022-02-18T18:15:00Z",
    "github_reviewed_at": "2022-03-04T21:37:26Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-74"
    ]
}
References

Affected packages

Packagist / ezsystems/ezpublish-kernel

Package

Name
ezsystems/ezpublish-kernel
Purl
pkg:composer/ezsystems/ezpublish-kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
7.5.0
Fixed
7.5.26

Affected versions

v7.*

v7.5.0
v7.5.1
v7.5.2
v7.5.3
v7.5.4
v7.5.5
v7.5.6-rc1
v7.5.6
v7.5.6.2
v7.5.7-rc1
v7.5.7
v7.5.7.1
v7.5.8
v7.5.9
v7.5.9.1
v7.5.10
v7.5.11
v7.5.12
v7.5.13
v7.5.14
v7.5.15
v7.5.15.1
v7.5.15.2
v7.5.16
v7.5.17
v7.5.18
v7.5.19
v7.5.20
v7.5.21
v7.5.22
v7.5.23
v7.5.24
v7.5.25