Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00YzJ3LXY1cnEtNW14N84AA8Hh

eZ Platform Editor Cross-site Scripting (XSS)

This Security Advisory is about two issues of low to medium severity. We recommend that you install the update as soon as possible.

There is an XSS vulnerability in CKEditor, which is used by AlloyEditor, which is used in eZ Platform Admin UI. Scripts can be injected through specially crafted "protected" comments. We are not sure it is exploitable in eZ Platform, but recommend installing it to be on the safe side. It is fixed in CKEditor v4.14, AlloyEditor v2.11.9. It is distributed via Composer, for:

eZ Platform v1.13.x: ezsystems/PlatformUIAssetsBundle v4.2.3 (included from ezsystems/PlatformUIBundle v1.13.x)
eZ Platform v2.5.13: ezsystems/ezplatform-admin-ui-assets v4.2.1
eZ Platform v3.0.*: ezsystems/ezplatform-admin-ui-assets v5.0.1
eZ Platform v3.1.2: ezsystems/ezplatform-admin-ui-assets v5.1.1

Drafts that are sent to trash become visible in the Review Queue, even for users that were not able to see them before this action. It's not possible to preview them, but their title and review history is displayed. This affects Enterprise Edition only, of which ezplatform-workflow is a part. This security update is distributed via Composer, for

eZ Platform EE v2.5.13: ezsystems/ezplatform-workflow v1.1.9
eZ Platform EE v3.1.2: ezsystems/ezplatform-workflow v2.1.1

Permalink: https://github.com/advisories/GHSA-4c2w-v5rq-5mx7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00YzJ3LXY1cnEtNW14N84AA8Hh
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 7 months ago
Updated: 7 months ago


Identifiers: GHSA-4c2w-v5rq-5mx7
References: Blast Radius: 0.0

Affected Packages

packagist:ezsystems/ezplatform-admin-ui-assets
Dependent packages: 12
Dependent repositories: 70
Downloads: 682,539 total
Affected Version Ranges: >= 5.1.0, < 5.1.1, >= 5.0.0, < 5.0.1, >= 4.2.0, < 4.2.1
Fixed in: 5.1.1, 5.0.1, 4.2.1
All affected versions: 4.2.0, 5.0.0, 5.1.0
All unaffected versions: 0.1.0, 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.5.0, 1.0.0, 2.0.0, 3.0.0, 3.1.0, 3.2.0, 4.0.0, 4.1.0, 4.2.1, 4.2.2, 5.0.1, 5.1.1, 5.2.0, 5.2.1, 5.2.2, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.3.4