Vulnerability Details CVE-2005-4856
The admin interface in eZ publish 3.5 before 3.5.7, 3.6 before 3.6.5, 3.7 before 3.7.3, and 3.8 before 20051110 does not properly handle authorization errors, which allows remote attackers to obtain sensitive information and see the admin pagelayout and associated templates via a request with (1) "anything after the url" or (2) a "wrong url".
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 48.3%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2005-4856
-
cpe:2.3:a:ez:ez_publish:2.9-3
-
cpe:2.3:a:ez:ez_publish:2.9-4
-
cpe:2.3:a:ez:ez_publish:2.9-5
-
cpe:2.3:a:ez:ez_publish:2.9-6
-
cpe:2.3:a:ez:ez_publish:2.9-7
-
cpe:2.3:a:ez:ez_publish:3.0-1
-
cpe:2.3:a:ez:ez_publish:3.0-2
-
cpe:2.3:a:ez:ez_publish:3.1-1
-
cpe:2.3:a:ez:ez_publish:3.1.0-1
-
cpe:2.3:a:ez:ez_publish:3.1.0-2
-
cpe:2.3:a:ez:ez_publish:3.2-1
-
cpe:2.3:a:ez:ez_publish:3.2-2
-
cpe:2.3:a:ez:ez_publish:3.2-3
-
cpe:2.3:a:ez:ez_publish:3.2-4
-
cpe:2.3:a:ez:ez_publish:3.2-5
-
cpe:2.3:a:ez:ez_publish:3.2-6
-
cpe:2.3:a:ez:ez_publish:3.2.0-1
-
cpe:2.3:a:ez:ez_publish:3.2.0-2
-
cpe:2.3:a:ez:ez_publish:3.3-1
-
cpe:2.3:a:ez:ez_publish:3.3-2
-
cpe:2.3:a:ez:ez_publish:3.3-3
-
cpe:2.3:a:ez:ez_publish:3.3-4
-
cpe:2.3:a:ez:ez_publish:3.3-5
-
cpe:2.3:a:ez:ez_publish:3.3-6
-
cpe:2.3:a:ez:ez_publish:3.3-7
-
cpe:2.3:a:ez:ez_publish:3.3.0-1
-
cpe:2.3:a:ez:ez_publish:3.3.0-2
-
cpe:2.3:a:ez:ez_publish:3.4.0
-
cpe:2.3:a:ez:ez_publish:3.4.1
-
cpe:2.3:a:ez:ez_publish:3.4.2
-
cpe:2.3:a:ez:ez_publish:3.4.3
-
cpe:2.3:a:ez:ez_publish:3.4.4
-
cpe:2.3:a:ez:ez_publish:3.4.5
-
cpe:2.3:a:ez:ez_publish:3.4.6
-
cpe:2.3:a:ez:ez_publish:3.4.7
-
cpe:2.3:a:ez:ez_publish:3.4.8
-
cpe:2.3:a:ez:ez_publish:3.5.0
-
cpe:2.3:a:ez:ez_publish:3.5.1
-
cpe:2.3:a:ez:ez_publish:3.5.10
-
cpe:2.3:a:ez:ez_publish:3.5.11
-
cpe:2.3:a:ez:ez_publish:3.5.2
-
cpe:2.3:a:ez:ez_publish:3.5.3
-
cpe:2.3:a:ez:ez_publish:3.5.4
-
cpe:2.3:a:ez:ez_publish:3.5.5
-
cpe:2.3:a:ez:ez_publish:3.5.6
-
cpe:2.3:a:ez:ez_publish:3.5.7
-
cpe:2.3:a:ez:ez_publish:3.5.8
-
cpe:2.3:a:ez:ez_publish:3.5.9
-
cpe:2.3:a:ez:ez_publish:3.6.0
-
cpe:2.3:a:ez:ez_publish:3.6.1
-
cpe:2.3:a:ez:ez_publish:3.6.10
-
cpe:2.3:a:ez:ez_publish:3.6.11
-
cpe:2.3:a:ez:ez_publish:3.6.12
-
cpe:2.3:a:ez:ez_publish:3.6.2
-
cpe:2.3:a:ez:ez_publish:3.6.3
-
cpe:2.3:a:ez:ez_publish:3.6.4
-
cpe:2.3:a:ez:ez_publish:3.6.5
-
cpe:2.3:a:ez:ez_publish:3.6.6
-
cpe:2.3:a:ez:ez_publish:3.6.7
-
cpe:2.3:a:ez:ez_publish:3.6.8
-
cpe:2.3:a:ez:ez_publish:3.6.9
-
cpe:2.3:a:ez:ez_publish:3.7.0
-
cpe:2.3:a:ez:ez_publish:3.7.1
-
cpe:2.3:a:ez:ez_publish:3.7.10
-
cpe:2.3:a:ez:ez_publish:3.7.11
-
cpe:2.3:a:ez:ez_publish:3.7.12
-
cpe:2.3:a:ez:ez_publish:3.7.2
-
cpe:2.3:a:ez:ez_publish:3.7.3
-
cpe:2.3:a:ez:ez_publish:3.7.4
-
cpe:2.3:a:ez:ez_publish:3.7.5
-
cpe:2.3:a:ez:ez_publish:3.7.6
-
cpe:2.3:a:ez:ez_publish:3.7.7
-
cpe:2.3:a:ez:ez_publish:3.7.8
-
cpe:2.3:a:ez:ez_publish:3.7.9
-
cpe:2.3:a:ez:ez_publish:3.8.0