FKIE_CVE-2005-4854

Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
eZ publish 3.5 through 3.7 before 20050830 does not use a folder's read permissions to restrict notifications, which allows remote authenticated users to obtain sensitive information about changes to content in arbitrary folders.
Impacted products
Vendor Product Version
ez ez_publish 3.5.0
ez ez_publish 3.5.1
ez ez_publish 3.5.2
ez ez_publish 3.5.3
ez ez_publish 3.5.4
ez ez_publish 3.5.5
ez ez_publish 3.5.6
ez ez_publish 3.5.7
ez ez_publish 3.5.8
ez ez_publish 3.5.9
ez ez_publish 3.5.10
ez ez_publish 3.5.11
ez ez_publish 3.6.0
ez ez_publish 3.6.1
ez ez_publish 3.6.2
ez ez_publish 3.6.3
ez ez_publish 3.6.4
ez ez_publish 3.6.5
ez ez_publish 3.6.6
ez ez_publish 3.6.7
ez ez_publish 3.6.8
ez ez_publish 3.6.9
ez ez_publish 3.6.10
ez ez_publish 3.6.11
ez ez_publish 3.6.12
ez ez_publish 3.7.0
ez ez_publish 3.7.1
ez ez_publish 3.7.2
ez ez_publish 3.7.3
ez ez_publish 3.7.4
ez ez_publish 3.7.5
ez ez_publish 3.7.6
ez ez_publish 3.7.7
ez ez_publish 3.7.8
ez ez_publish 3.7.9
ez ez_publish 3.7.10
ez ez_publish 3.7.11
ez ez_publish 3.7.12

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFFCB98A-B28B-4BC0-AF70-A75FD5845C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "489A43E7-1190-4F14-8499-7597013C8260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1FB755-41D8-4C8F-91EB-419C362F8FAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C966B6E-75DC-4470-B1F5-22424AF8EBEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA4CD0FB-13BD-4DDB-B82C-7204206F764F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE243CE3-75E4-4C29-BF80-30FEB6321BC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "504FCE83-4801-4ACC-81DF-402841B2B121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C62DE22-8ABC-4A27-86FD-D045887C1867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACF1838-EC9B-45EA-A5D0-0252E4E54F4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7047B492-D3B2-4685-A64A-3ABE3BD1E471",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FCCCA12-E984-492F-9AF2-D87053F0F09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "29AF4B41-4ADB-440E-9ADD-B70151000C98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14B2E33-CB8C-4F40-B7D1-3FE67E9D6D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E163DA2F-053F-4D9F-B793-9A2B70ADE342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECA5BE97-28F9-4DEE-BAB3-093D6F35F730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6035B56A-94C9-4131-9C49-3EE37DCE23A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F8F2AC-AB82-4925-91D2-A6DE65E4A4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A84C0A8-C576-4233-BC05-30CA56A41FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B179C9-6B87-4776-A4E5-7EF646931E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C5874-8115-4866-9C30-787786C80BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "798E2A15-C9F0-46EF-A7BC-ECFEE308A3C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E135AB2D-DB4B-4424-B628-70764128522D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C021175-DECB-4905-8712-E4E7D92F6002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "60FCD699-9D7C-4DF3-AEE4-F5A3CB42B72E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6B9929-87CB-4E6A-9468-23444D984E47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF55F25-B30D-4FC9-ADA7-7F185CD5338F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC77C98-2C37-49CE-AFB4-49D84BEC78FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "568B3930-DDA1-4582-B1E8-BA4B4E83E49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24159950-04AD-43EA-BEC5-C306A438CEDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF33FE5-094B-42E3-AFB4-EE344A0161D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "00844C2C-259B-4685-9B26-F9AD6B8C2019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1E923D5-B60D-4822-B1A7-AB3B32D3BA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "076912DC-A491-4572-A5F8-8E16783990BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB6ECF-28F3-429B-96C4-EC4A49CFEE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "63C48844-569E-4274-B039-285D20A257E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0853588-C50C-4BE0-9594-D015153E78FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E618D0C6-1679-44A2-B809-451E6EBDA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ez:ez_publish:3.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F050C746-AC77-4C50-BA1E-7308415C56E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "eZ publish 3.5 through 3.7 before 20050830 does not use a folder\u0027s read permissions to restrict notifications, which allows remote authenticated users to obtain sensitive information about changes to content in arbitrary folders."
    }
  ],
  "id": "CVE-2005-4854",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://ez.no/download/ez_publish/changelogs/ez_publish_3_8/changelog_3_6_x_3_7_x_to_3_8_0"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://issues.ez.no/6355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ez.no/download/ez_publish/changelogs/ez_publish_3_8/changelog_3_6_x_3_7_x_to_3_8_0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://issues.ez.no/6355"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…