Pimcore is an open source data and experience management platform. Prior to version 10.5.19, since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link. Users should upgrade to version 10.5.19 to receive a patch or, as a workaround, may apply the patch manually.
References
Link | Resource |
---|---|
https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch | Patch |
https://github.com/pimcore/pimcore/pull/14526 | Patch Vendor Advisory |
https://github.com/pimcore/pimcore/security/advisories/GHSA-vf7q-g2pv-jxvx | Patch Vendor Advisory |
https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch | Patch |
https://github.com/pimcore/pimcore/pull/14526 | Patch Vendor Advisory |
https://github.com/pimcore/pimcore/security/advisories/GHSA-vf7q-g2pv-jxvx | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch - Patch | |
References | () https://github.com/pimcore/pimcore/pull/14526 - Patch, Vendor Advisory | |
References | () https://github.com/pimcore/pimcore/security/advisories/GHSA-vf7q-g2pv-jxvx - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.2 |
Information
Published : 2023-03-22 21:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28438
Mitre link : CVE-2023-28438
CVE.ORG link : CVE-2023-28438
JSON object : View
Products Affected
pimcore
- pimcore
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')