CVE-2023-28438
CVSS V2 None
CVSS V3 None
Description
Pimcore is an open source data and experience management platform. Prior to version 10.5.19, since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link. Users should upgrade to version 10.5.19 to receive a patch or, as a workaround, may apply the patch manually.
Overview
- CVE ID
- CVE-2023-28438
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-22T21:15:18
- Last Modified Date
- 2023-03-27T22:13:52
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:* | 1 | OR | 10.5.19 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch | Patch |
https://github.com/pimcore/pimcore/pull/14526 | Patch Vendor Advisory |
https://github.com/pimcore/pimcore/security/advisories/GHSA-vf7q-g2pv-jxvx | Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28438 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28438 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:13:07 | Added to TrackCVE | |||
2023-04-17 03:13:10 | Weakness Enumeration | new |