
23/10/2024

6/11/2024
CVE-2024-49370: Change-Password via Portal-Profile sets PimcoreBackendUser password without hashing
First published: Wed Oct 23 2024(Updated: )
Pimcore is an open source data and experience management platform. When a PortalUserObject is connected to a PimcoreUser and "Use Pimcore Backend Password" is set to true, the change password function in Portal Profile sets the new password. Prior to Pimcore portal engine versions 4.1.7 and 3.1.16, the password is then set without hashing so it can be read by everyone. Everyone who combines PortalUser to PimcoreUsers and change passwords via profile settings could be affected. Versions 4.1.7 and 3.1.16 of the Pimcore portal engine fix the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|
Pimcore Pimcore | <3.1.16 | |
Pimcore Pimcore | >=4.0.0<4.1.7 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-49370?
The severity of CVE-2024-49370 is classified as high due to the potential for unauthorized password changes.
How do I fix CVE-2024-49370?
To fix CVE-2024-49370, upgrade to Pimcore version 4.1.8 or later.
What versions of Pimcore are affected by CVE-2024-49370?
CVE-2024-49370 affects Pimcore versions prior to 4.1.8 and between 4.0.0 and 4.1.7.
What type of vulnerability is CVE-2024-49370?
CVE-2024-49370 is a security vulnerability that allows unauthorized password changes for connected PortalUserObjects.
Is there a workaround for CVE-2024-49370?
As a temporary measure, disable the 'Use Pimcore Backend Password' option until an upgrade can be performed.
- agent/title
- agent/weakness
- agent/references
- agent/type
- agent/description
- agent/first-publish-date
- agent/author
- agent/event
- collector/mitre-cve
- source/MITRE
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/last-modified-date
- agent/severity
- agent/softwarecombine
- agent/tags
- agent/source
- vendor/pimcore
- canonical/pimcore pimcore
- version/pimcore pimcore/4.0.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203