Headline
CVE-2023-28429
Pimcore is an open source data and experience management platform. Versions prior to 10.5.19 have an unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user’s cookie and gain unauthorized access to that user’s account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 10.5.19 or, as a workaround, apply the patch manually.
From 33d1d831954a3762faf75d53c2075512cf421f36 Mon Sep 17 00:00:00 2001 From: Martin Eiber Date: Wed, 8 Mar 2023 11:15:07 +0100 Subject: [PATCH] Improve Tooltip. — …/Resources/public/js/pimcore/object/helpers/edit.js | 2 ± 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bundles/AdminBundle/Resources/public/js/pimcore/object/helpers/edit.js b/bundles/AdminBundle/Resources/public/js/pimcore/object/helpers/edit.js index 01bee53fd8e…f52992fd122 100644 — a/bundles/AdminBundle/Resources/public/js/pimcore/object/helpers/edit.js +++ b/bundles/AdminBundle/Resources/public/js/pimcore/object/helpers/edit.js @@ -428,7 +428,7 @@ pimcore.object.helpers.edit = { // apply tooltips if(field.tooltip) { try { - var tooltipHtml = field.tooltip; + var tooltipHtml = Ext.util.Format.htmlEncode(field.tooltip); // classification-store tooltips are already translated if (context.type != “classificationstore”) {
Related news
### Impact Unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14574.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14574.patch manually. ### References