Pimcore is an open source data and experience management platform. When a PortalUserObject is connected to a PimcoreUser and "Use Pimcore Backend Password" is set to true, the change password function in Portal Profile sets the new password. Prior to Pimcore portal engine versions 4.1.7 and 3.1.16, the password is then set without hashing so it can be read by everyone. Everyone who combines PortalUser to PimcoreUsers and change passwords via profile settings could be affected. Versions 4.1.7 and 3.1.16 of the Pimcore portal engine fix the issue.
References
Link | Resource |
---|---|
https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Nov 2024, 22:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc - Exploit, Vendor Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Pimcore pimcore
Pimcore |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
CPE | cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:* |
25 Oct 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-23 15:15
Updated : 2024-11-06 22:31
NVD link : CVE-2024-49370
Mitre link : CVE-2024-49370
CVE.ORG link : CVE-2024-49370
JSON object : View
Products Affected
pimcore
- pimcore
CWE