Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-30849: [Security] Fix Admin Translation Export SQL Injection by mattamon · Pull Request #14968 · pimcore/pimcore

Pimcore is an open source data and experience management platform. Prior to version 10.5.21, A SQL injection vulnerability exists in the translation export API. Users should update to version 10.5.21 to receive a patch or, as a workaround, or apply the patch manually.

CVE
#sql#vulnerability

Additional info****WHAT****🤖 Generated by Copilot at 87dcc28

This pull request enhances the translation controller by using safer and more flexible SQL queries, and by handling errors gracefully. It also allows more advanced filtering options for the translation grid.

🤖 Generated by Copilot at 87dcc28

To make the translation controller secure
We use placeholders and catch errors for sure
We also change getGridFilterCondition
To return an array with more precision
And support filters that are complex and obscure

HOW****🤖 Generated by Copilot at 87dcc28

  • Import SyntaxErrorException class to handle syntax errors in SQL queries (link)
  • Modify exportAction and translationsAction methods to use array format of getGridFilterCondition method and catch SyntaxErrorException (link, link, link, link)
  • Refactor getGridFilterCondition method to return array with condition and parameters, use placeholders, and support admin filter (link, link, link, link, link, link)

Related news

GHSA-xmg8-w465-mr56: SQL Injection in Translation Export API

### Impact SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "filter" GET parameter. The parameter accepts JSON formatted data. The value of JSON key "property" inside "filter" is not sanitized properly and is used in a SQL statement in an unsafe manner,...

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907