Filtered by vendor Pimcore
Subscriptions
Total
140 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-30852 | 1 Pimcore | 1 Pimcore | 2025-01-30 | 4.4 Medium |
Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the `/admin/misc/script-proxy` API endpoint that is accessible by an authenticated administrator user is vulnerable to arbitrary JavaScript and CSS file read via the `scriptPath` and `scripts` parameters. The `scriptPath` parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of `../` patterns to go out from the application webroot followed by path of the folder where the file is located in the "scriptPath" parameter and the file name in the "scripts" parameter. The JavaScript file is successfully read only if the web application has read access to it. Users should update to version 10.5.21 to receive a patch or, as a workaround, apply the patch manual. | ||||
CVE-2023-30855 | 1 Pimcore | 1 Pimcore | 2025-01-29 | 6.5 Medium |
Pimcore is an open source data and experience management platform. Versions of Pimcore prior to 10.5.18 are vulnerable to path traversal. The impact of this path traversal and arbitrary extension is limited to creation of arbitrary files and appending data to existing files. When combined with the SQL Injection, the exported data `RESTRICTED DIFFUSION 9 / 9` can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver. Users may upgrade to version 10.5.18 to receive a patch or, as a workaround, apply the patch manually. | ||||
CVE-2023-2614 | 1 Pimcore | 1 Pimcore | 2025-01-27 | 5.4 Medium |
Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21. | ||||
CVE-2023-2615 | 1 Pimcore | 1 Pimcore | 2025-01-27 | 5.4 Medium |
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21. | ||||
CVE-2023-2616 | 1 Pimcore | 1 Pimcore | 2025-01-27 | 5.4 Medium |
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21. | ||||
CVE-2023-2629 | 1 Pimcore | 1 Customer Management Framework | 2025-01-27 | 7.8 High |
Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9. | ||||
CVE-2023-2630 | 1 Pimcore | 1 Pimcore | 2025-01-27 | 4.8 Medium |
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | ||||
CVE-2023-32075 | 1 Pimcore | 1 Customer Management Framework | 2025-01-24 | 4.3 Medium |
The Customer Management Framework (CMF) for Pimcore adds functionality for customer data management. In `pimcore/customer-management-framework-bundle` prior to version 3.3.9, business logic errors are possible in the `Conditions` tab since the counter can be a negative number. This vulnerability is capable of the unlogic in the counter value in the Conditions tab. Users should update to version 3.3.9 to receive a patch or, as a workaround, or apply the patch manually. | ||||
CVE-2023-2730 | 1 Pimcore | 1 Pimcore | 2025-01-22 | 5.4 Medium |
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3. | ||||
CVE-2023-2756 | 1 Pimcore | 1 Customer Management Framework | 2025-01-22 | 7.2 High |
SQL Injection in GitHub repository pimcore/customer-data-framework prior to 3.3.10. | ||||
CVE-2023-2881 | 1 Pimcore | 1 Customer-data-framework | 2025-01-16 | 4.9 Medium |
Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10. | ||||
CVE-2023-2984 | 2 Microsoft, Pimcore | 2 Windows, Pimcore | 2025-01-13 | 8.8 High |
Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22. | ||||
CVE-2023-2983 | 1 Pimcore | 1 Pimcore | 2025-01-10 | 8.8 High |
Privilege Defined With Unsafe Actions in GitHub repository pimcore/pimcore prior to 10.5.23. | ||||
CVE-2024-32871 | 1 Pimcore | 1 Pimcore | 2024-11-21 | 7.5 High |
Pimcore is an Open Source Data & Experience Management Platform. The Pimcore thumbnail generation can be used to flood the server with large files. By changing the file extension or scaling factor of the requested thumbnail, attackers can create files that are much larger in file size than the original. This vulnerability is fixed in 11.2.4. | ||||
CVE-2024-24822 | 1 Pimcore | 1 Admin Classic Bundle | 2024-11-21 | 6.5 Medium |
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Prior to version 1.3.3, an attacker can create, delete etc. tags without having the permission to do so. A fix is available in version 1.3.3. As a workaround, one may apply the patch manually. | ||||
CVE-2024-23648 | 1 Pimcore | 1 Admin Classic Bundle | 2024-11-21 | 8.8 High |
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password. The URL sent contains a unique token, valid during 24 hours, allowing the user to reset its password. This token is highly sensitive ; as an attacker able to retrieve it would be able to resets the user's password. Prior to version 1.2.3, the reset-password URL is crafted using the "Host" HTTP header of the request sent to request a password reset. This way, an external attacker could send password requests for users, but specify a "Host" header of a website that they control. If the user receiving the mail clicks on the link, the attacker would retrieve the reset token of the victim and perform account takeover. Version 1.2.3 fixes this issue. | ||||
CVE-2024-23646 | 1 Pimcore | 1 Admin Classic Bundle | 2024-11-21 | 8.8 High |
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The application allows users to create zip files from available files on the site. In the 1.x branch prior to version 1.3.2, parameter `selectedIds` is susceptible to SQL Injection. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. Version 1.3.2 contains a fix for this issue. | ||||
CVE-2024-21667 | 1 Pimcore | 1 Customer Management Framework | 2024-11-21 | 6.5 Medium |
pimcore/customer-data-framework is the Customer Management Framework for management of customer data within Pimcore. An authenticated and unauthorized user can access the GDPR data extraction feature and query over the information returned, leading to customer data exposure. Permissions are not enforced when reaching the `/admin/customermanagementframework/gdpr-data/search-data-objects` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. An unauthorized user can access PII data from customers. This vulnerability has been patched in version 4.0.6. | ||||
CVE-2024-21666 | 1 Pimcore | 1 Customer Management Framework | 2024-11-21 | 6.5 Medium |
The Customer Management Framework (CMF) for Pimcore adds functionality for customer data management, segmentation, personalization and marketing automation. An authenticated and unauthorized user can access the list of potential duplicate users and see their data. Permissions are enforced when reaching the `/admin/customermanagementframework/duplicates/list` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. Unauthorized user(s) can access PII data from customers. This vulnerability has been patched in version 4.0.6. | ||||
CVE-2024-21665 | 1 Pimcore | 1 E-commerce Framework | 2024-11-21 | 4.3 Medium |
ecommerce-framework-bundle is the Pimcore Ecommerce Framework Bundle. An authenticated and unauthorized user can access the back-office orders list and be able to query over the information returned. Access control and permissions are not being enforced. This vulnerability has been patched in version 1.0.10. |