First published: Thu Apr 27 2023(Updated: )
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe.patch manually. ### References https://huntr.dev/bounties/e436ed71-6741-4b30-89db-f7f3de4aca2c/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Pimcore E-commerce Framework | =10.5.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2332 is considered a high severity vulnerability due to its potential to steal user cookies and allow unauthorized access to accounts.
To fix CVE-2023-2332, update your Pimcore installation to version 10.5.21 or apply the provided manual patch.
CVE-2023-2332 affects Pimcore versions 10.5.19 and below.
CVE-2023-2332 can enable cookie theft attacks, allowing attackers to gain unauthorized access to users' accounts.
While there is no public indication of active exploitation for CVE-2023-2332, it is advisable to apply security updates immediately.