GHSA-mgfg-7533-7jf6: ezsystems/ezplatform-http-cache affected by Breach with Varnish VCL
This is not a vulnerability in the code per se, but included Varnish VCL templates enable compression of API and JSON messages. This is a potential case of the BREACH vulnerability, which affects HTTP compression, where secrets can be extracted through carefully crafted requests. The fix disables compression in these templates. Please make sure to make the same change in your configuration files, see the release notes for specific instructions. Please check your web server configuration as well.
References
- developers.ibexa.co/security-advisories/ibexa-sa-2024-006-vulnerabilities-in-content-name-pattern-commerce-shop-and-varnish-vhost-templates
- doc.ibexa.co/en/latest/update_and_migration/from_3.3/update_from_3.3/
- github.com/advisories/GHSA-mgfg-7533-7jf6
- github.com/ezsystems/ezplatform-http-cache
- github.com/ezsystems/ezplatform-http-cache/commit/ca8a5cf69b2c14fbec90412aeeef5c755c51457b
- github.com/ezsystems/ezplatform-http-cache/security/advisories/GHSA-mgfg-7533-7jf6
- github.com/ibexa/http-cache/security/advisories/GHSA-fh7v-q458-7vmw
- github.com/ibexa/post-install/security/advisories/GHSA-4h8f-c635-25p7
- www.breachattack.com/
Detect and mitigate GHSA-mgfg-7533-7jf6 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →