CVE-2023-46722 – pimcore/admin-ui-classic-bundle
Package
Manager: composer
Name: pimcore/admin-ui-classic-bundle
Vulnerable Version: >=0 <1.2.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00011 pctl0.00955
Details
Pimcore Admin Classic Bundle Cross-site Scripting (XSS) in PDF previews ### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Proof of Concept Step 1. Go to /admin and login. Step 2. In Documents, go to home -> click on Sample Content -> click Document folder Step 3. Upload file PDF content XSS payload ### Patches Apply patches https://github.com/pimcore/pimcore/commit/757375677dc83a44c6c22f26d97452cc5cda5d7c.patch https://github.com/pimcore/admin-ui-classic-bundle/commit/19fda2e86557c2ed4978316104de5ccdaa66d8b9.patch ### Workarounds Update to version 1.2.0 or apply patches manually https://github.com/pimcore/pimcore/commit/757375677dc83a44c6c22f26d97452cc5cda5d7c.patch https://github.com/pimcore/admin-ui-classic-bundle/commit/19fda2e86557c2ed4978316104de5ccdaa66d8b9.patch
Metadata
Created: 2023-11-01T14:35:42Z
Modified: 2023-11-01T14:35:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-jfxw-6c5v-c42f/GHSA-jfxw-6c5v-c42f.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-jfxw-6c5v-c42f
Finding: F425
Auto approve: 1