First published: Tue Oct 31 2023(Updated: )
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Proof of Concept Step 1. Go to /admin and login. Step 2. In Documents, go to home -> click on Sample Content -> click Document folder Step 3. Upload file PDF content XSS payload ### Patches Apply patches https://github.com/pimcore/pimcore/commit/757375677dc83a44c6c22f26d97452cc5cda5d7c.patch https://github.com/pimcore/admin-ui-classic-bundle/commit/19fda2e86557c2ed4978316104de5ccdaa66d8b9.patch ### Workarounds Update to version 1.2.0 or apply patches manually https://github.com/pimcore/pimcore/commit/757375677dc83a44c6c22f26d97452cc5cda5d7c.patch https://github.com/pimcore/admin-ui-classic-bundle/commit/19fda2e86557c2ed4978316104de5ccdaa66d8b9.patch
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Admin Classic Bundle | <1.2.0 | |
composer/pimcore/admin-ui-classic-bundle | <1.2.0 | 1.2.0 |
https://github.com/pimcore/admin-ui-classic-bundle/commit/19fda2e86557c2ed4978316104de5ccdaa66d8b9
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46722 is a vulnerability in Pimcore Admin Classic Bundle that allows for cross-site scripting (XSS) attacks in PDF previews.
The vulnerability has the potential to steal user cookies and gain unauthorized access to user accounts or redirect users to malicious sites.
An attacker can exploit CVE-2023-46722 by injecting malicious scripts into PDF previews, which can then execute in a user's browser.
To fix CVE-2023-46722, update to version 1.2.0 of the Pimcore Admin Classic Bundle package.
The CWE IDs associated with CVE-2023-46722 are CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page) and CWE-79 (Improper Neutralization of Input During Web Page Generation).