Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-hg77-vx9v-f49x: Path Traversal in Asset "import from server" option

### Impact An authenticated attacker can abuse import-server-files with a path traversal to download an arbitrary file from the server An arbitrary file read vulnerability allows an attacker to read files on the server that they should not have access to, potentially including sensitive files such as configuration files, user data, and credentials. This can result in the exposure of confidential information, which can be used to launch further attacks or compromise the system. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch manually. ### References https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14/

ghsa
#vulnerability#git#auth
GHSA-r7mm-jx6h-hv7m: Cross-site Scripting (XSS) in Conditions tab of Pricing Rules

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe.patch manually. ### References https://huntr.dev/bounties/e436ed71-6741-4b30-89db-f7f3de4aca2c/

GHSA-2295-vh28-pphc: Cross-site Scripting (XSS) in DataObjects QuantityValue Unit Definition

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply these patches manually https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe.patch https://github.com/pimcore/pimcore/commit/b9c9ca2371aa643dbc4caca162ff3400266ff96f.patch ### Workarounds Apply patches: https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe.patch https://github.com/pimcore/pimcore/commit/b9c9ca2371aa643dbc4caca162ff3400266ff96f.patch ### References https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6/

GHSA-x9xj-pqmv-8jf7: Cross-site Scripting (XSS) in DataObject Class date fields

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch manually. ### References https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6/

GHSA-cjv6-w5hf-5wr6: Cross-site Scripting (XSS) in Ecommerce Pricing Rules name field

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e.patch manually. ### References https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3/

GHSA-476g-v7hf-cw5m: Cross-site Scripting (XSS) in Document Properties Parameter

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773.patch manually. ### References https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67/

GHSA-4x35-vr82-xvj6: SQL Injection in AssetController

### Impact SQL injections in AssetController due to unsanitized concatenating strings in where clause. The attacker can dump database, alter data or perform dos on the backend database. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520.patch manually. ### References https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462/

GHSA-2c67-p4xh-m34w: Cross-site Scripting (XSS) in Website Settings name field

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patches manually https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091.patch https://github.com/pimcore/pimcore/commit/42a5bbe5f16b97371fdbfdcf2bb3ee759dea8564.patch ### Workarounds Apply patches manually: https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091.patch https://github.com/pimcore/pimcore/commit/42a5bbe5f16b97371fdbfdcf2bb3ee759dea8564.patch ### References https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829/

GHSA-fq95-rx4q-qgg2: Cross-site Scripting (XSS) in Admin Login too many attempts notice

### Impact Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then impersonate that user. Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user. Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/66f1089fb1b9bcd575bfce9b1d4abb0f0499df11.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/66f1089fb1b9bcd575bfce9b1d4abb0f0499df11.patch manually. ### References https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d/

GHSA-9q7q-r54q-3f3g: Cross-site Scripting (XSS) in DataObject Classification Store

### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e.patch manually. ### References https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2/