Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-w9wc-4xcq-8gr6: Akeneo PIM Community Edition vulnerable to remote php code execution

Impact

Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image.

Patches

Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability.
Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022.

Workarounds

Replace any reference to <FilesMatch \.php$> in your apache httpd configurations with: <Location "/index.php">, as shown in https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39.

<!–

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:

ghsa
#vulnerability#apache#git#php#auth#docker

Akeneo PIM Community Edition vulnerable to remote php code execution

High severity GitHub Reviewed Published Dec 9, 2022 in akeneo/pim-community-dev • Updated Dec 9, 2022

Package

composer akeneo/pim-community-dev (Composer)

Affected versions

>= 6.0.0, < 6.0.53

< 5.0.119

Patched versions

6.0.53

5.0.119

Description

Impact

Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image.

Patches

Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability.
Community Edition users must change their Apache HTTP server configuration accordingly to be protected.
The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022.

Workarounds

Replace any reference to <FilesMatch .php$> in your apache httpd configurations with: <Location "/index.php">, as shown in https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39.

References

  • GHSA-w9wc-4xcq-8gr6
  • akeneo/pim-community-dev@891a2f7
  • https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39

adesaegher published the maintainer security advisory

Dec 9, 2022

Severity

High

8.8

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

Low

User interaction

None

Scope

Unchanged

Confidentiality

High

Integrity

High

Availability

High

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CWE-434

CVE ID

CVE-2022-46157

GHSA ID

GHSA-w9wc-4xcq-8gr6

Source code

akeneo/pim-community-dev

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2022-46157: pim-community-dev/httpd.conf at b4d79bb073c8b68ea26ab227c97cc78d86c4cba1 · akeneo/pim-community-dev

Akeneo PIM is an open source Product Information Management (PIM). Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. Users are advised to upgrade. Users unable to upgrade may Replace any reference to `<FilesMatch \.php$>` in their apache httpd configurations with: `<Location "/index.php">`.