Quantcast
Viewing latest article 16
Browse Latest Browse All 21

Xss vulnerability on user/login

This Security Update fixes a cross site scripting (XSS) vulnerability where an attacker could insert JavaScript commands into POST parameters of the login template. The update ensures that such commands cannot be executed. We strongly recommend that you install this Security Update as soon as possible. If your web site has template overrides for login.tpl, please note it is mandatory to use the "wash" template operator on $postData:key and $postData:item, i.e. the usage should look like this: Please also note that this fix is released as three independent updates, for different parts of eZ Publish and extensions.

Patches

eZ Publish: https://github.com/ezsystems/ezpublish-legacy/commit/d5a5a482f9a429a3bb01827db6a5b3c30b0e9192

eZ Webin: https://github.com/ezsystems/ezwebin/commit/099b42a8a77206c233756a3475c234d720c9a85b

eZ Demo: https://github.com/ezsystems/ezdemo/commit/6d36d12d64d6ee5115eb5053478ea6a080f565a6


Viewing latest article 16
Browse Latest Browse All 21

Trending Articles