First published: Fri Oct 30 2020(Updated: )
The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{"keyId"%3a"''","groupId"%3a"'asd'))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,'',11,12,'',14+from+users)+--+"}]
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore E-commerce Framework | >=6.7.2<6.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7759 is classified as a medium severity vulnerability due to its potential for SQL Injection attacks.
To fix CVE-2020-7759, you should upgrade Pimcore from version 6.7.2 or earlier to version 6.8.3 or later.
CVE-2020-7759 affects the data classification functionality in the ClassificationstoreController of the Pimcore package.
Yes, CVE-2020-7759 can be exploited remotely by sending specially-crafted input to the application.
The impact of CVE-2020-7759 could allow an attacker to execute arbitrary SQL queries against the database.