First published: Thu Apr 27 2023(Updated: )
### Impact SQL injections in AssetController due to unsanitized concatenating strings in where clause. The attacker can dump database, alter data or perform dos on the backend database. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520.patch manually. ### References https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Pimcore Pimcore | <10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2338.
The title of the vulnerability is SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.21.
The impact of this vulnerability is SQL injections in AssetController due to unsanitized concatenating strings in the where clause. The attacker can dump the database, alter data, or perform DoS on the backend database.
To mitigate this vulnerability, update to version 10.5.21 or apply the patch manually using the following link: https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520
The severity of this vulnerability is high with a CVSS score of 8.8.