Page 12 of 113 results (0.011 seconds)

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

Pimcore is an Open Source Data & Experience Management Platform: PIM, MDM, CDP, DAM, DXP/CMS & Digital Commerce. The upload functionality for updating user profile does not properly validate the file content-type, allowing any authenticated user to bypass this security check by adding a valid signature (p.e. GIF89) and sending any invalid content-type. This could allow an authenticated attacker to upload HTML files with JS content that will be executed in the context of the domain. This issue has been patched in version 10.5.16. • https://github.com/pimcore/pimcore/commit/75a448ef8ac74424cf4e723afeb6d05f9eed872f https://github.com/pimcore/pimcore/security/advisories/GHSA-8xv4-jj4h-qww6 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.14. cross site scripting (XSS): almacenado en el repositorio de GitHub pimcore/pimcore antes del 10.5.14. • https://github.com/pimcore/pimcore/commit/746fac1a342841624f63ab13edcd340358e1bc04 https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

Pimcore is an open source data and experience management platform. Prior to version 10.5.9, the user controlled twig templates rendering in `Pimcore/Mail` & `ClassDefinition\Layout\Text` is vulnerable to server-side template injection, which could lead to remote code execution. Version 10.5.9 contains a patch for this issue. As a workaround, one may apply the patch manually. Pimcore es una plataforma de gestión de experiencias y datos de código abierto. • https://github.com/pimcore/pimcore/commit/43aa34e018f5cd447bceb864358285ba92f68372 https://github.com/pimcore/pimcore/pull/13347 https://github.com/pimcore/pimcore/pull/13347.patch https://github.com/pimcore/pimcore/security/advisories/GHSA-5qxq-vgmm-q39m • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can: Perform any action within the application that the user can perform. View any information that the user is able to view. Modify any information that the user is able to modify. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user. • https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.6. Una vulnerabilidad de tipo Cross-site Scripting (XSS) - Almacenado en el repositorio de GitHub pimcore/pimcore versiones anteriores a 10.5.6 • https://github.com/pimcore/pimcore/commit/0508c491c6a4f3d119ec8dcf444e52ff25028c36 https://huntr.dev/bounties/31ac0506-ae38-4128-a46d-71d5d079f8b7 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •