First published: Wed Feb 07 2024(Updated: )
### Impact You can create, delete etc. tags without having the permission to do so. This vulnerability allows an attacker to perform broken access control and add tags to admin panel and add dumy data. One can do this as intruder and add text parameters with random numbers and this will effect integrity and availability. ### Patches Available in version 1.3.3. ### Workarounds Apply this pull request manually: https://github.com/pimcore/admin-ui-classic-bundle/pull/412 ### References -
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/admin-ui-classic-bundle | <1.3.3 | 1.3.3 |
Pimcore admin-ui-classic-bundle | <1.3.3 |
https://github.com/pimcore/admin-ui-classic-bundle/commit/24660b6d5ad9cbcb037a48d4309a6024e9adf251
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24822 is classified as a medium severity vulnerability due to broken access control in the affected software.
To fix CVE-2024-24822, upgrade to the latest version of the Pimcore Admin UI Classic Bundle beyond 1.3.3.
CVE-2024-24822 allows unauthorized users to create and delete tags, leading to possible data manipulation.
CVE-2024-24822 affects Pimcore Admin UI Classic Bundle version 1.3.3 and earlier.
Any users of the Pimcore Admin UI Classic Bundle versions up to 1.3.3 are vulnerable to CVE-2024-24822.