First published: Sat Sep 14 2019(Updated: )
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a `phar://` URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the `phar://../../../../../../../../var/www/html/web/var/assets/` directory, a different vulnerability than CVE-2019-10867 and CVE-2019-16318.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | <5.7.1 | 5.7.1 |
Pimcore E-commerce Framework | <5.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16317 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2019-16317, upgrade Pimcore to version 5.7.1 or later.
CVE-2019-16317 is caused by the lack of blocking for PHAR file uploads, allowing attackers to exploit the system using crafted filenames.
CVE-2019-16317 affects all versions of Pimcore prior to 5.7.1.
An attacker with limited privileges can execute arbitrary PHP code by triggering a .phar file upload.