First published: Fri Jul 21 2023(Updated: )
### Impact Unauthorized users are able to obtain sensitive information about the system's runtime environment, features they have no permissions to access, etc. ### Patches Update to version 10.6.4 or apply this patch manually https://github.com/pimcore/pimcore/commit/0237527b3244d251fa5ecd4912dfe4f8b2125c54.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/0237527b3244d251fa5ecd4912dfe4f8b2125c54.patch manually. ### References https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c/
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.6.4 | |
composer/pimcore/pimcore | <10.6.4 | 10.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Unauthorized users can obtain sensitive information about the system's runtime environment and features they have no permissions to access.
Update to version 10.6.4 or apply the patch manually from the GitHub commit: https://github.com/pimcore/pimcore/commit/0237527b3244d251fa5ecd4912dfe4f8b2125c54
The severity of CVE-2023-3819 is high, with a severity value of 7.
Software versions up to but exclusive of 10.6.4 are affected by CVE-2023-3819.
For more information, you can refer to the following resources: [GitHub Commit](https://github.com/pimcore/pimcore/commit/0237527b3244d251fa5ecd4912dfe4f8b2125c54), [Huntr Bounty](https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c), [GitHub Security Advisory](https://github.com/pimcore/pimcore/security/advisories/GHSA-r87r-982q-2c3q).