Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-42817
HistorySep 25, 2023 - 6:57 p.m.

CVE-2023-42817 Cross-site Scripting (XSS) in pimcore admin-ui-classic-bundle translations

2023-09-2518:57:33
CWE-79
GitHub_M
github.com
cross-site scripting
pimcore admin
ui
translation
patch
security update

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.7

Confidence

Low

EPSS

0.001

Percentile

21.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Pimcore admin-ui-classic-bundle provides a Backend UI for Pimcore. The translation value with text including “%s” (from “%suggest%) is parsed by sprintf() even though it’s supposed to be output literally to the user. The translations may be accessible by a user with comparatively lower overall access (as the translation permission cannot be scoped to certain “modules”) and a skilled attacker might be able to exploit the parsing of the translation string in the dialog box. This issue has been patched in commit abd77392 which is included in release 1.1.2. Users are advised to update to version 1.1.2 or apply the patch manually.

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.7

Confidence

Low

EPSS

0.001

Percentile

21.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-42817