8.8
CWE
89
Advisory Published
Advisory Published
Updated

CVE-2023-30850: Pimcore SQL Injection Vulnerability in Admin Translations API

First published: Thu Apr 27 2023(Updated: )

### Impact SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "filter" POST parameter. The parameter accepts JSON formatted data. The value of JSON key "property" inside "filter" is not sanitized properly and is used in a SQL statement in an unsafe manner, resulting in SQL injection. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch manually. ### References https://github.com/pimcore/pimcore/pull/14952

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Pimcore Pimcore<10.5.21
composer/pimcore/pimcore<10.5.21
10.5.21

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-30850?

    CVE-2023-30850 is a SQL Injection vulnerability in the admin translations API of the Pimcore data and experience management platform.

  • What is the severity of CVE-2023-30850?

    The severity of CVE-2023-30850 is rated as high with a CVSS score of 8.8.

  • How does the SQL Injection vulnerability in CVE-2023-30850 affect Pimcore?

    The SQL Injection vulnerability in CVE-2023-30850 allows an attacker to manipulate the admin translations API of Pimcore, potentially leading to unauthorized access or data manipulation.

  • What is the recommended action to fix CVE-2023-30850?

    Users should update their Pimcore installation to version 10.5.21 or apply the patch manually to mitigate the SQL Injection vulnerability in CVE-2023-30850.

  • Where can I find more information about CVE-2023-30850?

    More information about CVE-2023-30850 can be found in the Pimcore GitHub repository, including the commit patch and security advisory links.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203