First published: Thu May 25 2023(Updated: )
### Impact The customer view exposes the hashed password along with other deails. An attacker is then able to enum password of a particular id, likewise we can replace id with other user , for example 1015, password hash can be disclosed which can be further cracked with hashcat ### Patches Update to version 3.3.10 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch ### Workarounds Apply https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch manually. ### References https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Customer-data-framework | <3.3.10 | |
composer/pimcore/customer-management-framework-bundle | <3.3.10 | 3.3.10 |
https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The impact of CVE-2023-2881 is that the hashed password can be exposed, allowing an attacker to potentially crack it.
An attacker can exploit CVE-2023-2881 by enumerating passwords based on user IDs and attempting to crack the hashed passwords.
To fix CVE-2023-2881, you should update the affected software to version 3.3.10 or higher.
You can find more information about CVE-2023-2881 in the following references: [link 1](https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416), [link 2](https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6), [link 3](https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-j65r-g7q2-f8v3).
The severity of CVE-2023-2881 is medium with a CVSS score of 6.7.