Skip to content

Commit 23bdcd6

Browse files
1 parent 59c8910 commit 23bdcd6

2 files changed

Lines changed: 17 additions & 8 deletions

File tree

advisories/github-reviewed/2021/03/GHSA-mrvj-7q4f-5p42/GHSA-mrvj-7q4f-5p42.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mrvj-7q4f-5p42",
4-
"modified": "2021-03-19T19:56:16Z",
4+
"modified": "2026-02-02T19:55:39Z",
55
"published": "2021-03-19T19:56:42Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2021-46875"
8+
],
79
"summary": "Cross-site scripting in eZ Platform Kernel",
810
"details": "### Impact\nIn file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.\n\n### Patches\nThe fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See \"Patched versions\". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting \"ezsettings.default.io.file_storage.file_type_blacklist\" at:\nhttps://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109\n\n### Important note\nYou should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.",
911
"severity": [],
@@ -102,10 +104,18 @@
102104
"type": "WEB",
103105
"url": "https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42"
104106
},
107+
{
108+
"type": "ADVISORY",
109+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46875"
110+
},
105111
{
106112
"type": "WEB",
107113
"url": "https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b"
108114
},
115+
{
116+
"type": "PACKAGE",
117+
"url": "https://github.com/ezsystems/ezpublish-kernel"
118+
},
109119
{
110120
"type": "WEB",
111121
"url": "https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1"

advisories/github-reviewed/2023/03/GHSA-c737-jhwr-fqxj/GHSA-c737-jhwr-fqxj.json

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c737-jhwr-fqxj",
4-
"modified": "2025-03-05T13:54:16Z",
4+
"modified": "2026-02-02T19:55:34Z",
55
"published": "2023-03-12T06:30:21Z",
6-
"aliases": [
7-
"CVE-2021-46875"
8-
],
9-
"summary": "Cross Site Scripting in eZ Platform Ibexa Kernel",
10-
"details": "## Impact\n\nIn file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.\nPatches\n\n## Patches\n\nThe fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See \"Patched versions\". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting \"ezsettings.default.io.file_storage.file_type_blacklist\" at:\nhttps://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109\nImportant note\n\n## Important note\n\nYou should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.",
6+
"withdrawn": "2026-02-02T19:55:34Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: Cross Site Scripting in eZ Platform Ibexa Kernel",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-mrvj-7q4f-5p42. This link is maintained to preserve external references.\n\n## Original Description\n## Impact\n\nIn file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.\nPatches\n\n## Patches\n\nThe fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See \"Patched versions\". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting \"ezsettings.default.io.file_storage.file_type_blacklist\" at:\nhttps://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109\nImportant note\n\n## Important note\n\nYou should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.",
1110
"severity": [
1211
{
1312
"type": "CVSS_V3",

0 commit comments

Comments
 (0)