Page 22 of 111 results (0.009 seconds)

CVSS: 8.8EPSS: 84%CPEs: 1EXPL: 3

An issue was discovered in Pimcore before 5.7.1. An attacker with classes permission can send a POST request to /admin/class/bulk-commit, which will make it possible to exploit the unserialize function when passing untrusted values in the data parameter to bundles/AdminBundle/Controller/Admin/DataObject/ClassController.php. Se ha descubierto un problema en Pimcore en versiones anteriores a la 5.7.1. Un atacante con permiso de clases puede enviar una petición POST a admin/class/bulk-commit, que hace que sea posible explotar la función "unserialize" a la hora de pasar valores no fiables en el parámetro "data" en bundles/AdminBundle/Controller/Admin/DataObject/ClassController.php. • https://www.exploit-db.com/exploits/46783 http://packetstormsecurity.com/files/152667/Pimcore-Unserialize-Remote-Code-Execution.html http://www.rapid7.com/db/modules/exploit/multi/http/pimcore_unserialize_rce https://blog.certimetergroup.com/it/articolo/security/polyglot_phar_deserialization_to_rce https://github.com/pimcore/pimcore/commit/38a29e2f4f5f060a73974626952501cee05fda73 https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-173998 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 4

Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the X-pimcore-csrf-token anti-CSRF token only in the "Settings > Users / Roles" function. Pimcore en versiones anteriores a la 5.3.0 permite que los atacantes remotos realicen ataques Cross-Site Request Forgery (CSRF) utilizando la validación del token anti-CSRF X-pimcore-csrf-token solo en la función "Settings > Users / Roles". Pimcore versions 5.2.3 and below suffer from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/45208 http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html http://seclists.org/fulldisclosure/2018/Aug/13 https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 4

Pimcore before 5.3.0 allows SQL Injection via the REST web service API. Pimcore en versiones anteriores a la 5.3.0 permite la inyección SQL mediante la API REST de servicio web. Pimcore versions 5.2.3 and below suffer from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/45208 http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html http://seclists.org/fulldisclosure/2018/Aug/13 https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 4

Pimcore allows XSS via Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions. Pimcore permite Cross-Site Scripting (XSS) mediante las funciones Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value y Static Routes. Pimcore versions 5.2.3 and below suffer from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/45208 http://packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.html http://seclists.org/fulldisclosure/2018/Aug/13 https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 6%CPEs: 4EXPL: 2

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a Zend_Pdf_ElementFactory_Proxy object and a pathname with a trailing \0 character. La función getObjectByToken en Newsletter.php en el módulo Pimcore_Tool_Newsletter en pimcore 1.4.9 hasta 2.0.0 no maneja debidamente un objeto obtenido deserializando dotas de búsqueda Lucene, lo que permite a atacantes remotos realizar ataques de inyección de objetos PHP y ejecutar código arbitrario a través de vectores involucrando un objeto Zend_Pdf_ElementFactory_Proxy y un nombre de ruta con un caracter \0 final. • https://www.exploit-db.com/exploits/43886 http://openwall.com/lists/oss-security/2014/04/21/1 http://www.pimcore.org/en/resources/blog/pimcore+2.2+released_b442 https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt • CWE-94: Improper Control of Generation of Code ('Code Injection') •