There are several security issues likely unfixed in ez publish (though 
it is not clear since the debian version is much older than the 
versions mentioned in the CVEs). There hasn't been a maintainer 
upload of ezpublish in 4.5 years. It has a RC bug open since for 4 
months. It should be removed from the archive.


CVE-2005-4855:
Unrestricted file upload vulnerability in eZ publish 3.5 before 3.5.5,
3.6 before 3.6.2, 3.7 before 3.7.0rc2, and 3.8 before 20050922 does
not restrict Image datatype uploads to image content types, which
allows remote authenticated users to upload certain types of files, as
demonstrated by .js files, which may enable cross-site scripting (XSS)
attacks or other attacks.

CVE-2005-4854:
eZ publish 3.5 through 3.7 before 20050830 does not use a folder's
read permissions to restrict notifications, which allows remote
authenticated users to obtain sensitive information about changes to
content in arbitrary folders.

CVE-2005-4853:
The default configuration of the forum package in eZ publish 3.5
before 3.5.5, 3.6 before 3.6.2, 3.7 before 3.7.0rc2, and 3.8 before
20050818 does not restrict edit permissions to a posting's owner,
which allows remote authenticated users to edit arbitrary postings.

CVE-2005-4852:
The siteaccess URIMatching implementation in eZ publish 3.5 through
3.8 before 20050812 converts all non-alphanumeric characters in a URI
to '_' (underscore), which allows remote attackers to bypass access
restrictions by inserting certain characters in a URI, as demonstrated
by a request for /admin:de, which matches a rule allowing only
/admin_de to access /admin.

CVE-2005-4851:
eZ publish 3.4.4 through 3.7 before 20050722 applies certain
permissions on the node level, which allows remote authenticated users
to bypass the original permissions on embedded objects in XML fields
and read these objects.

CVE-2005-4850:
eZ publish 3.5 through 3.7 before 20050608 requires both edit and
create permissions in order to submit data, which allows remote
attackers to edit data submitted by arbitrary anonymous users.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to