XSS in HTML-Tags in pimcore/pimcore
Valid
Reported on
Jan 31st 2023
Description
Cross site scripting vulnerability in pimcore/pimcore in HTML-Tags of "SEO & Settings"
Proof of Concept
1. Login in stable account URL : https://demo.pimcore.fun/admin/?_dc=1675166039&perspective=
2. Go to Home ---> SEO & Settings
3. Enter Payload in HTML-Tags
For More Understanding please check POC : https://drive.google.com/file/d/18_sFHJXEZyubEZ3MO6KK1oBtDZ_BuXpR/view?usp=sharing
Impact
The vulnerability is capable of stolen the user cookie.
Occurrences
We are processing your report and will contact the
pimcore
team within 24 hours.
2 months ago
Sanket Salavi modified the report
2 months ago
We have contacted a member of the
pimcore
team and are waiting to hear back
2 months ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
settings.js#L57
has been validated
Remo Liebi
commented
6 days ago
I don't agree with this classification. This is by no means a 5.2 or even worth a CVE. The Process is only available for logged in users an can be disabled by permission. By the logic of this "bug" a "in-tool" file editor is worth a CVE as well.
to join this conversation