Miggo Logo

CVE-2023-1116:
Pimcore vulnerable to Cross Site Scripting in Email Blacklist

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.0002%
Published
3/1/2023
Updated
3/6/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer< 10.5.1810.5.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from insufficient input sanitization in both backend processing (EmailController.php's blacklistAction) and frontend handling (blacklist.js operations). The PHP code lacked email-specific filtering before storing values, while the JavaScript UI components rendered unsanitized user input in confirmation dialogs and grid entries. The patches added FILTER_SANITIZE_EMAIL server-side and a client-side sanitizeEmail function, confirming these were the vulnerable points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** *tt**k*r **n *x**ut* *r*itr*ry J*v*S*ript *n* st**l *ooki*s in*orm*tion *n* us* t**m to *ij**k t** us*r's s*ssion. ### P*t***s Up**t* to v*rsion **.*.** or *pply t*is p*t** m*nu*lly *ttps://*it*u*.*om/pim*or*/pim*or*/pull/*****.p*t**

Reasoning

T** vuln*r**ility st*mm** *rom insu**i*i*nt input s*nitiz*tion in *ot* ***k*n* pro**ssin* (*m*il*ontroll*r.p*p's *l**klist**tion) *n* *ront*n* **n*lin* (*l**klist.js op*r*tions). T** P*P *o** l**k** *m*il-sp**i*i* *ilt*rin* ***or* storin* v*lu*s, w*i