Miggo Logo

CVE-2022-0256:
pimcore is vulnerable to Cross-site Scripting

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.00726%
Published
1/21/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer< 10.2.910.2.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the CustomReportController.php's getReportConfigAction method returning user-controlled data (like report names, CSS classes) without proper escaping. The GitHub patch explicitly adds htmlspecialchars() to these fields, proving they were previously vulnerable to XSS. The JavaScript validation in item.js was a secondary defense, but the core vulnerability was server-side output encoding omission in this controller method.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

pim*or* is vuln*r**l* to Improp*r N*utr*liz*tion o* Input *urin* W** P*** **n*r*tion ('*ross-sit* S*riptin*')

Reasoning

T** vuln*r**ility st*ms *rom t** `*ustomR*port*ontroll*r.p*p`'s `**tR*port*on*i***tion` m*t*o* r*turnin* us*r-*ontroll** **t* (lik* r*port n*m*s, *SS *l*ss*s) wit*out prop*r *s**pin*. T** *it*u* p*t** *xpli*itly ***s `*tmlsp**i*l***rs()` to t**s* *i*