CVE-2024-23646

Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The application allows users to create zip files from available files on the site. In the 1.x branch prior to version 1.3.2, parameter `selectedIds` is susceptible to SQL Injection. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. Version 1.3.2 contains a fix for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*

History

21 Nov 2024, 08:58

Type Values Removed Values Added
References () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2006 - Issue Tracking () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2006 - Issue Tracking
References () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2087 - Issue Tracking () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2087 - Issue Tracking
References () https://github.com/pimcore/admin-ui-classic-bundle/commit/363afef29496cc40a8b863c2ca2338979fcf50a8 - Patch () https://github.com/pimcore/admin-ui-classic-bundle/commit/363afef29496cc40a8b863c2ca2338979fcf50a8 - Patch
References () https://github.com/pimcore/admin-ui-classic-bundle/releases/tag/v1.3.2 - Release Notes () https://github.com/pimcore/admin-ui-classic-bundle/releases/tag/v1.3.2 - Release Notes
References () https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv - Exploit, Vendor Advisory () https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv - Exploit, Vendor Advisory

31 Jan 2024, 21:10

Type Values Removed Values Added
First Time Pimcore
Pimcore admin Classic Bundle
References () https://github.com/pimcore/admin-ui-classic-bundle/commit/363afef29496cc40a8b863c2ca2338979fcf50a8 - () https://github.com/pimcore/admin-ui-classic-bundle/commit/363afef29496cc40a8b863c2ca2338979fcf50a8 - Patch
References () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2087 - () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2087 - Issue Tracking
References () https://github.com/pimcore/admin-ui-classic-bundle/releases/tag/v1.3.2 - () https://github.com/pimcore/admin-ui-classic-bundle/releases/tag/v1.3.2 - Release Notes
References () https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv - () https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv - Exploit, Vendor Advisory
References () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2006 - () https://github.com/pimcore/admin-ui-classic-bundle/blob/1.x/src/Controller/Admin/Asset/AssetController.php#L2006 - Issue Tracking
CPE cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

24 Jan 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-24 20:15

Updated : 2024-11-21 08:58


NVD link : CVE-2024-23646

Mitre link : CVE-2024-23646

CVE.ORG link : CVE-2024-23646


JSON object : View

Products Affected

pimcore

  • admin_classic_bundle
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')