First published: Mon Oct 30 2023(Updated: )
### Impact As old password can be set as new password , it is considered as password policy violation. Pimcore is not enforcing strict password policy which allow attacker to set old password as new password Proof of Concept 1. Go to Admin link 2. login and click on -> "User | My Profile". 3. Go to change password now put old password as new password and click save. ### Patches https://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea.patch ### Workarounds Update to version 1.2.0 or apply this patches manually https://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea.patch ### References https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Admin Classic Bundle | <1.2.0 | |
composer/pimcore/admin-ui-classic-bundle | <1.2.0 | 1.2.0 |
https://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5844 is medium with a CVSS score of 4.3.
CVE-2023-5844 allows an attacker to set an old password as the new password in Pimcore, violating password policy.
To exploit CVE-2023-5844, an attacker can go to the Admin link, log in, and click on "User | My Profile" to set an old password as the new password.
The affected software of CVE-2023-5844 is pimcore/admin-ui-classic-bundle version up to exclusive 1.2.0.
Yes, the fixed version for CVE-2023-5844 is pimcore/admin-ui-classic-bundle version 1.2.0 or later.