Pimcore

Pimcore

127 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 30.10.2020 11:15:12
  • Zuletzt bearbeitet 21.11.2024 05:37:44

The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter ...

  • EPSS 0.01%
  • Veröffentlicht 18.11.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:52

pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 't...

  • EPSS 0.01%
  • Veröffentlicht 15.11.2019 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:33:56

Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.

  • EPSS 0.01%
  • Veröffentlicht 15.11.2019 05:15:12
  • Zuletzt bearbeitet 21.11.2024 04:33:55

Pimcore before 6.2.2 lacks an Access Denied outcome for a certain scenario of an incorrect recipient ID of a notification.

  • EPSS 0.01%
  • Veröffentlicht 15.11.2019 05:15:12
  • Zuletzt bearbeitet 21.11.2024 04:33:56

bundles/AdminBundle/Controller/Admin/EmailController.php in Pimcore before 6.3.0 allows script execution in the Email Log preview window because of the lack of a Content-Security-Policy header.

  • EPSS 0.01%
  • Veröffentlicht 15.11.2019 05:15:12
  • Zuletzt bearbeitet 21.11.2024 04:33:56

Pimcore before 6.2.2 lacks brute force protection for the 2FA token.

  • EPSS 0.01%
  • Veröffentlicht 31.10.2019 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:33:27

Pimcore 6.2.3 has XSS in the translations grid because bundles/AdminBundle/Resources/public/js/pimcore/settings/translations.js mishandles certain HTML elements.

  • EPSS 0.01%
  • Veröffentlicht 14.09.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:30:30

In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/htm...

  • EPSS 0.01%
  • Veröffentlicht 14.09.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:30:30

In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability t...

Exploit
  • EPSS 52.73%
  • Veröffentlicht 04.04.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:00

An issue was discovered in Pimcore before 5.7.1. An attacker with classes permission can send a POST request to /admin/class/bulk-commit, which will make it possible to exploit the unserialize function when passing untrusted values in the data parame...