Miggo Logo

CVE-2023-0323: pimcore is vulnerable to cross-site scripting via "title field " in data objects

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.00051%
Published
1/20/2023
Updated
1/24/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer< 10.5.1410.5.14

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unvalidated 'title' field input in class definitions. The patch adds a regex check for HTML tags in the title field within generateLayoutTreeFromArray(). Before this fix, the function did not sanitize title values, enabling XSS when malicious titles were rendered in admin interfaces. The function's direct handling of user-controlled title input and the specific patch location confirm its role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** vuln*r**ility is **p**l* o* r*sultin* in stol*n us*r *ooki*s. #### Proo* o* *on**pt ``` Lo*in wit* **v ***ount *ttps://**.x-**v.pim*or*.*un/**min/?_**=**********&p*rsp**tiv*= *o to s*ttin* --> **t* o*j**ts --> *l*ss*s --> *v*nts *li

Reasoning

T** vuln*r**ility st*ms *rom unv*li**t** 'titl*' *i*l* input in *l*ss ***initions. T** p*t** ***s * r***x ****k *or *TML t**s in t** titl* *i*l* wit*in `**n*r*t*L*youtTr***rom*rr*y()`. ***or* t*is *ix, t** *un*tion *i* not s*nitiz* titl* v*lu*s, *n**