First published: Mon Jun 27 2022(Updated: )
Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the listing classes. This issue has been resolved in version 10.4.4. Users are advised to upgrade or to apple the patch manually. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-31092 is classified as medium, indicating a notable risk that requires attention.
To fix CVE-2022-31092, you should upgrade Pimcore to version 10.4.4 or later.
CVE-2022-31092 may allow for SQL injection attacks through improper handling of quoted columns in listing classes.
CVE-2022-31092 affects Pimcore versions prior to 10.4.4.
Yes, CVE-2022-31092 has been recognized and documented within the Pimcore community.