First published: Tue May 02 2023(Updated: )
### Impact The impact of this path traversal and arbitrary extension is limited (creation of arbitrary files and appending data to existing files) but when combined with the SQL Injection, the exported data `RESTRICTED DIFFUSION 9 / 9` can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver. ### Patches Update to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch manually. ### References https://github.com/pimcore/pimcore/pull/14498
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.5.18 | |
composer/pimcore/pimcore | <10.5.18 | 10.5.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30855 is a path traversal vulnerability in Pimcore, an open source data and experience management platform, that allows an attacker to create arbitrary files and append data to existing files.
CVE-2023-30855 has a severity rating of 7.5 (high).
CVE-2023-30855 allows an attacker to perform path traversal and create arbitrary files or append data to existing files in Pimcore.
Versions of Pimcore prior to 10.5.18 are affected by CVE-2023-30855.
To fix CVE-2023-30855, update your Pimcore installation to version 10.5.18 or later.