Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually.
References
Link | Resource |
---|---|
https://github.com/pimcore/pimcore/commit/c59d0bf1d03a5037b586fe06230694fa3818dbf2 | Patch |
https://github.com/pimcore/pimcore/pull/14669.patch | Mailing List Patch |
https://github.com/pimcore/pimcore/security/advisories/GHSA-x5j3-mq9g-8jc8 | Vendor Advisory |
https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a | Exploit Third Party Advisory |
https://github.com/pimcore/pimcore/commit/c59d0bf1d03a5037b586fe06230694fa3818dbf2 | Patch |
https://github.com/pimcore/pimcore/pull/14669.patch | Mailing List Patch |
https://github.com/pimcore/pimcore/security/advisories/GHSA-x5j3-mq9g-8jc8 | Vendor Advisory |
https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () https://github.com/pimcore/pimcore/commit/c59d0bf1d03a5037b586fe06230694fa3818dbf2 - Patch | |
References | () https://github.com/pimcore/pimcore/pull/14669.patch - Mailing List, Patch | |
References | () https://github.com/pimcore/pimcore/security/advisories/GHSA-x5j3-mq9g-8jc8 - Vendor Advisory | |
References | () https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a - Exploit, Third Party Advisory |
Information
Published : 2023-03-16 17:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28106
Mitre link : CVE-2023-28106
CVE.ORG link : CVE-2023-28106
JSON object : View
Products Affected
pimcore
- pimcore
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')