Skip to content

/user/sessions endpoint allows detecting valid accounts

High severity GitHub Reviewed Published Mar 9, 2021 in ezsystems/ezplatform-rest • Updated Jan 9, 2023

Package

composer ezsystems/ezplatform-rest (Composer)

Affected versions

>= 1.2.0, <= 1.2.2.0
>= 1.3.0, <= 1.3.1.0

Patched versions

1.2.2.1
1.3.1.1

Description

This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.

If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc

References

@glye glye published to ezsystems/ezplatform-rest Mar 9, 2021
Reviewed Mar 11, 2021
Published to the GitHub Advisory Database Mar 11, 2021
Last updated Jan 9, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-7vwg-39h8-8qp8

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.