CVE-2024-23648Injection in Admin-ui-classic-bundle

CWE-74Injection6 documents4 sources
Severity
8.8HIGHNVD
EPSS
0.0%
top 93.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 24
Latest updateFeb 20

Description

Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password. The URL sent contains a unique token, valid during 24 hours, allowing the user to reset its password. This token is highly sensitive ; as an attacker able to retrieve it would be able to resets the user's password. Prior to version 1.2.3, the reset-password URL is crafted using the "Host

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

Patches

🔴Vulnerability Details

5
GHSA
Pimcore Host Header Injection in user invitation link2024-02-20
OSV
Pimcore Host Header Injection in user invitation link2024-02-20
CVEList
Pimcore Admin Classic Bundle host header injection in the password reset2024-01-24
GHSA
Host header injection in the password reset2024-01-24
OSV
Host header injection in the password reset2024-01-24
CVE-2024-23648 — Injection in Admin-ui-classic-bundle | cvebase