Quantcast
Viewing all articles
Browse latest Browse all 21

XSS attack possible in content/browse

This Security Update fixes a cross site scripting (XSS) vulnerability where an attacker could insert JavaScript commands into the ViewMode parameter of the Browse view. The update ensures that such commands cannot be executed. We strongly recommend that you install this Security Update as soon as possible. If your web site has a template override for browse.tpl, please note it is mandatory to use the "wash" template operator on the "{$cancel_action}", i.e. it should read "". Please also note that this fix is released as four independent updates, for different parts of eZ Publish and extensions.

Patches

eZ Publish: https://github.com/ezsystems/ezpublish-legacy/commit/cae73336555934968ec3fcaf987094075424c4fa

eZ Webin: https://github.com/ezsystems/ezwebin/commit/4c2ffdc51d0a30c43e6eb723ce89156829b68c92

eZ Demo: https://github.com/ezsystems/ezdemo/commit/233bff1b4910fcc7e6cbffdd0b03f2c3cc26e5c1

eZ XMLExport: https://github.com/ezsystems/ezxmlexport/commit/df26c3915fd582bddaf9ca6a488efe6972cf60bc


Viewing all articles
Browse latest Browse all 21

Trending Articles