First published: Wed May 10 2023(Updated: )
### Impact The pimcore application is vulnerable to Formula Injection/CSV Injection via the Firstname, Lastname, Street, Zip & City input fields. These vulnerabilities allow unauthenticated attackers to execute arbitrary code via a crafted excel file. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. ### Patches Update to version 3.3.9 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803.patch ### Workarounds Apply patch https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803.patch manually. ### References https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Customer Management Framework | <3.3.9 | |
composer/pimcore/customer-management-framework-bundle | <3.3.9 | 3.3.9 |
https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2629 refers to the vulnerability of Improper Neutralization of Formula Elements in a CSV File in the GitHub repository pimcore/customer-data-framework prior to version 3.3.9.
CVE-2023-2629 has a severity rating of 7.8 (high).
The Pimcore Customer Management Framework versions up to exclusive version 3.3.9 are affected by CVE-2023-2629.
To fix CVE-2023-2629, it is recommended to update the Pimcore Customer Management Framework to version 3.3.9 or higher.
You can find more information about CVE-2023-2629 in the GitHub repository at https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803 and on Huntr.dev at https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01.