Miggo Logo

CVE-2024-25625:
Pimcore Host Header Injection in user invitation link

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.03216%
Published
2/20/2024
Updated
2/20/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/admin-ui-classic-bundlecomposer< 1.3.41.3.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two connected functions: 1) invitationLinkAction initiates URL generation without validating the Host header, and 2) generateCustomUrl relies on the request context containing the attacker-controlled Host header. The proof of concept shows manipulation of the Host header directly affects the generated URL, and the patch specifically modifies invitationLinkAction to set a validated host from system settings before URL generation. Both functions work in tandem to create the vulnerable flow where untrusted input (Host header) directly impacts output URL construction.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Ov*rvi*w * pot*nti*l s**urity vuln*r**ility *is*ov*r** in `pim*or*/**min-ui-*l*ssi*-*un*l*` v*rsion up to v*.*.* . T** vuln*r**ility involv*s * *ost *****r Inj**tion in t** `invit*tionLink**tion` *un*tion o* t** Us*r*ontroll*r, sp**i*i**lly in t*

Reasoning

T** vuln*r**ility st*ms *rom two *onn**t** *un*tions: *) `invit*tionLink**tion` initi*t*s URL **n*r*tion wit*out v*li**tin* t** *ost *****r, *n* *) `**n*r*t**ustomUrl` r*li*s on t** r*qu*st *ont*xt *ont*inin* t** *tt**k*r-*ontroll** *ost *****r. T**