First published: Thu Apr 27 2023(Updated: )
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply these patches manually https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe.patch https://github.com/pimcore/pimcore/commit/b9c9ca2371aa643dbc4caca162ff3400266ff96f.patch ### Workarounds Apply patches: https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe.patch https://github.com/pimcore/pimcore/commit/b9c9ca2371aa643dbc4caca162ff3400266ff96f.patch ### References https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.5.21 | |
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2328 is medium.
The affected software for CVE-2023-2328 is Pimcore prior to version 10.5.21.
To fix CVE-2023-2328, update Pimcore to version 10.5.21 or later.
The Common Weakness Enumeration (CWE) ID for CVE-2023-2328 is CWE-79.
You can find more information about CVE-2023-2328 at the following references: [GitHub commit](https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe), [Huntr.dev](https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6).