Description
|
|
Some vulnerabilities have been reported in eZ Publish, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, and disclose potentially sensitive information.
1) Input passed via the URL to ezjscore/call is not properly sanitised in the eZ JS Core extension before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
This vulnerability is reported in versions 4.6 and prior running with eZ JS Core extension versions 1.4 and prior.
2) An error within the eZ JS Core extension can be exploited to change node priorities without edit access rights.
3) An error related to content fetching in the eZ JS Core extension can be exploited to disclose the contents and metadata of content objects within the database.
The vulnerabilities #2 and #3 are reported in eZ JS Core extension versions 1.2, 1.3, and 1.4.
|