CVE-2021-37702 – Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore
https://notcve.org/view.php?id=CVE-2021-37702
Pimcore is an open source data & experience management platform. Prior to version 10.1.1, Data Object CSV import allows formular injection. The problem is patched in 10.1.1. Aside from upgrading, one may apply the patch manually as a workaround. Pimcore es una plataforma de administración de datos y experiencias de código abierto. • https://github.com/pimcore/pimcore/pull/9992 https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •
CVE-2021-23405 – SQL Injection
https://notcve.org/view.php?id=CVE-2021-23405
This affects the package pimcore/pimcore before 10.0.7. This issue exists due to the absence of check on the storeId parameter in the method collectionsActionGet and groupsActionGet method within the ClassificationstoreController class. Esto afecta al paquete pimcore/pimcore versiones anteriores a 10.0.7. Este problema se presenta debido a la ausencia de comprobación del parámetro storeId en el método collectionsActionGet y groupsActionGet dentro de la clase ClassificationstoreController • https://github.com/pimcore/pimcore/pull/9572 https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-23340 – Local File Inclusion
https://notcve.org/view.php?id=CVE-2021-23340
This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability. • https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454 https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442 https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-26246 – Authorization bypass in Pimcore
https://notcve.org/view.php?id=CVE-2020-26246
Pimcore is an open source digital experience platform. In Pimcore before version 6.8.5 it is possible to modify & create website settings without having the appropriate permissions. Pimcore es una plataforma de experiencia digital de código abierto. En Pimcore anterior a la versión 6.8.5, es posible modificar y crear la configuración del sitio web sin contar con los permisos apropiados • https://github.com/pimcore/pimcore/pull/7618 https://github.com/pimcore/pimcore/security/advisories/GHSA-7p8p-4253-3mg6 • CWE-281: Improper Preservation of Permissions CWE-285: Improper Authorization •
CVE-2020-7759 – SQL Injection
https://notcve.org/view.php?id=CVE-2020-7759
The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{"keyId"%3a"''","groupId"%3a"'asd'))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,'',11,12,'',14+from+users)+--+"}] Las versiones 6.7.2 y anteriores a 6.8.3 del paquete pimcore/pimcore, son vulnerables una inyección SQL en la funcionalidad data classification en ClassificationstoreController. Esto puede ser explotado mediante el envío de una entrada diseñada específicamente en el parámetro RelationsIds, como es demostrado por la siguiente petición: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{"keyId"%3a"''","groupId"%3a"'asd'))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,'',11,12,'',14+from+users)+--+"}] • https://github.com/pimcore/pimcore/pull/7315 https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •