First published: Thu Apr 27 2023(Updated: )
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773.patch manually. ### References https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.5.21 | |
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2322.
The severity level of CVE-2023-2322 is medium.
The vulnerability affects Pimcore versions up to and excluding 10.5.21.
You can find more information about this vulnerability at the following references: [GitHub Commit](https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773) and [Huntr Bounty](https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67).
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-79.