First published: Thu Apr 27 2023(Updated: )
### Impact Stored cross site scripting vulnerability in operator any getter in dataobject grid configuration. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patch manually. ### References https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2339.
CVE-2023-2339 has a severity rating of medium (5.4).
CVE-2023-2339 is a stored cross-site scripting (XSS) vulnerability that affects the operator any getter in the dataobject grid configuration of the Pimcore software.
To mitigate this vulnerability, update Pimcore to version 10.5.21 or apply the provided patch manually.
You can find more information about CVE-2023-2339 in the following references: [GitHub Security Advisory](https://github.com/pimcore/pimcore/security/advisories/GHSA-6fvf-x8c6-2f6j), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-2339), [GitHub Commit](https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480).