Miggo Logo

CVE-2023-1429: Cross-site Scripting (XSS) in Document Types

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.00027%
Published
3/16/2023
Updated
3/22/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer< 10.5.1910.5.19

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patch adds Ext.util.Format.htmlEncode() to sanitize data.data.name in the delete confirmation dialog. This indicates the original code lacked proper output encoding for the Name field value when constructing UI elements, making it susceptible to reflected XSS via malicious document type names. The vulnerability manifests in the client-side JavaScript handler responsible for displaying deletion confirmation messages.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Uns**ur** N*m* *i*l* in *o*um*nt Typ*s mo*ul* in S*ttin*s. T*is vuln*r**ility **s t** pot*nti*l to st**l * us*r's *ooki* *n* **in un*ut*oriz** ****ss to t**t us*r's ***ount t*rou** t** stol*n *ooki* or r**ir**t us*rs to ot**r m*li*ious si

Reasoning

T** p*t** ***s `*xt.util.*orm*t.*tml*n*o**()` to s*nitiz* **t*.**t*.n*m* in t** **l*t* *on*irm*tion *i*lo*. T*is in*i**t*s t** ori*in*l *o** l**k** prop*r output *n*o*in* *or t** N*m* *i*l* v*lu* w**n *onstru*tin* UI *l*m*nts, m*kin* it sus**pti*l* t