Vulnerability Details : CVE-2023-5192
Potential exploit
Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.
Products affected by CVE-2023-5192
- cpe:2.3:a:pimcore:core:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-5192
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H |
0.9
|
5.2
|
huntr.dev | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L |
3.9
|
2.5
|
NIST |
CWE ids for CVE-2023-5192
-
The product performs a data query with a large number of joins and sub-queries on a large data table.Assigned by: security@huntr.dev (Primary)
References for CVE-2023-5192
-
https://github.com/pimcore/demo/commit/a2a7ff3b565882aefb759804aac4a51afb458f1f
Disable introspection (#437) · pimcore/demo@a2a7ff3 · GitHubPatch
-
https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7
Instropection query is enabled on demo.pimcore.fun vulnerability found in demoExploit;Third Party Advisory
Jump to