{ "schema_version": "1.4.0", "id": "GHSA-6vf6-g3pr-j83h", "modified": "2023-01-24T18:56:50Z", "published": "2023-01-20T16:55:24Z", "aliases": [ "CVE-2023-0323" ], "summary": "pimcore is vulnerable to cross-site scripting via \"title field \" in data objects", "details": "### Impact\nThe vulnerability is capable of resulting in stolen user cookies.\n\n#### Proof of Concept\n```\nLogin with dev account https://11.x-dev.pimcore.fun/admin/?_dc=1670962076&perspective=\n\nGo to setting --> data objects --> classes --> events\n\nClick media under genaral settings\n\nAdd payload in title field.\n\nGo to data objects module and open events, xss will trigger\n\n// PoC.js \">\n```\n### Patches\nUpdate to version 10.5.14 or apply this patch manually https://github.com/pimcore/pimcore/pull/13916.patch\n\n### Workarounds\nApply https://github.com/pimcore/pimcore/pull/13916.patch manually.\n\n### References\nhttps://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343/\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "Packagist", "name": "pimcore/pimcore" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "10.5.14" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-6vf6-g3pr-j83h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0323" }, { "type": "WEB", "url": "https://github.com/pimcore/pimcore/pull/13916.patch" }, { "type": "WEB", "url": "https://github.com/pimcore/pimcore/commit/746fac1a342841624f63ab13edcd340358e1bc04" }, { "type": "PACKAGE", "url": "https://github.com/pimcore/pimcore" }, { "type": "WEB", "url": "https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-01-20T16:55:24Z", "nvd_published_at": "2023-01-16T15:15:00Z" } }