Vulnerability Details : CVE-2023-28429
Pimcore is an open source data and experience management platform. Versions prior to 10.5.19 have an unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 10.5.19 or, as a workaround, apply the patch manually.
Vulnerability category: Cross site scripting (XSS)Bypass
Products affected by CVE-2023-28429
- cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28429
0.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28429
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
GitHub, Inc. |
CWE ids for CVE-2023-28429
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-28429
-
https://github.com/pimcore/pimcore/pull/14574
[Task]: Improve Tooltip. by martineiber · Pull Request #14574 · pimcore/pimcore · GitHubPatch
-
https://github.com/pimcore/pimcore/security/advisories/GHSA-rcg9-hrhx-6q69
Cross-site Scripting (XSS) in DataObject tooltip field · Advisory · pimcore/pimcore · GitHubPatch;Vendor Advisory
-
https://github.com/pimcore/pimcore/pull/14574.patch
Patch
Jump to