GHSA-4h8f-c635-25p7: ibexa/post-install affected by Breach with Varnish VCL
This is not a vulnerability in the code per se, but included platform.sh Varnish VCL templates and Apache/Nginx vhost templates enable compression of API and JSON messages. This is a potential case of the BREACH vulnerability, which affects HTTP compression, where secrets can be extracted through carefully crafted requests. The fix disables compression in these templates. Please make sure to make the same change in your configuration files, see the release notes for specific instructions.
References
- developers.ibexa.co/security-advisories/ibexa-sa-2024-006-vulnerabilities-in-content-name-pattern-commerce-shop-and-varnish-vhost-templates
- doc.ibexa.co/en/latest/update_and_migration/from_3.3/update_from_3.3/
- doc.ibexa.co/en/latest/update_and_migration/from_4.6/update_from_4.6/
- github.com/advisories/GHSA-4h8f-c635-25p7
- github.com/ezsystems/ezplatform-http-cache/security/advisories/GHSA-mgfg-7533-7jf6
- github.com/ibexa/http-cache/security/advisories/GHSA-fh7v-q458-7vmw
- github.com/ibexa/post-install
- github.com/ibexa/post-install/commit/d91cc02623dd3263a99a94ace133c95e48909e5d
- github.com/ibexa/post-install/security/advisories/GHSA-4h8f-c635-25p7
- www.breachattack.com/
Detect and mitigate GHSA-4h8f-c635-25p7 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →