Miggo Logo

CVE-2018-14058: Pimcore SQLi Vulnerability

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.80951%
Published
5/14/2022
Updated
7/25/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer<= 5.2.35.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in REST API endpoints (/asset-, /document-, /object-*) that accept 'condition' and 'id' parameters. These parameters flow directly into SQL query construction through the corresponding Listing classes' setCondition methods. The functions identified are: 1) Controller actions handling vulnerable API endpoints, 2) Model layer methods that directly incorporate user input into SQL queries without parameterization. High confidence comes from exploit documentation showing direct parameter injection and Pimcore's architecture patterns for REST handlers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Pim*or* ***or* *.*.* *llows SQL Inj**tion vi* t** R*ST w** s*rvi** *PI.

Reasoning

T** vuln*r**ility m*ni**sts in R*ST *PI *n*points (/*ss*t-*, /*o*um*nt-*, /o*j**t-*) t**t ****pt '*on*ition' *n* 'i*' p*r*m*t*rs. T**s* p*r*m*t*rs *low *ir**tly into SQL qu*ry *onstru*tion t*rou** t** *orr*spon*in* Listin* *l*ss*s' s*t*on*ition m*t*o