First published: Thu Apr 27 2023(Updated: )
### Impact The attacker is capable to stolen the user session cookie. it will leads to complete account takeover. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/aa38319e353cc3cdfac12e03e21ed7a8f3628d3e.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/aa38319e353cc3cdfac12e03e21ed7a8f3628d3e.patch manually. ### References https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Pimcore Pimcore | <10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2340.
The CVE-2023-2340 vulnerability allows an attacker to steal user session cookies, leading to a complete account takeover.
To fix the CVE-2023-2340 vulnerability, update to version 10.5.21 of the pimcore/pimcore package or apply the patch manually.
The severity of the CVE-2023-2340 vulnerability is medium with a CVSS score of 5.4.
You can find more information about the CVE-2023-2340 vulnerability at the following references: [link1], [link2], [link3].