CWE
209 89
Advisory Published
CVE Published
Updated

CVE-2023-47636: Full Path Disclosure via re-export document in pimcore/admin-ui-classic-bundle

First published: Wed Nov 15 2023(Updated: )

### Impact Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view. In the case of pimcore, the fopen() function here doesn't have an error handle when the file doesn't exist on the server so the server response raises the full path "fopen(/var/www/html/var/tmp/export-{ uniqe id}.csv)" ### Patches Apply patch https://github.com/pimcore/admin-ui-classic-bundle/commit/10d178ef771097604a256c1192b098af9ec57a87.patch ### Workarounds Update to version 1.2.1 or apply [patches](https://github.com/pimcore/admin-ui-classic-bundle/commit/10d178ef771097604a256c1192b098af9ec57a87.patch) manually ### References https://huntr.com/bounties/4af4db18-9fd4-43e9-8bc6-c88aaf76839c/

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
composer/pimcore/admin-ui-classic-bundle<1.2.1
1.2.1
Pimcore Admin Classic Bundle<1.2.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-47636?

    CVE-2023-47636 is a Full Path Disclosure vulnerability in the pimcore/admin-ui-classic-bundle package.

  • What is the impact of CVE-2023-47636?

    The impact of CVE-2023-47636 is that it allows attackers to see the full path to the webroot/file, potentially exposing sensitive information.

  • Which software versions are affected by CVE-2023-47636?

    pimcore/admin-ui-classic-bundle version up to and excluding 1.2.1 is affected by CVE-2023-47636.

  • How severe is CVE-2023-47636?

    CVE-2023-47636 has a severity rating of 5.3 (Medium).

  • Is there a fix for CVE-2023-47636?

    Yes, upgrading to version 1.2.1 or higher of pimcore/admin-ui-classic-bundle resolves CVE-2023-47636.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203