Bypass Stored XSS in Catalog in pimcore/pimcore
Valid
Reported on
Mar 30th 2023
- Login in URL : https://demo.pimcore.fun/admin
- Go to File -> Perspectives -> Catalog
- Click in tab Properties -> footer -> Open
- click any Find & Order -> Edit
- in tab Basic, inject payload to :
Prameters, Anchor
in tab Advanced, inject payload to:Class
For more understanding please check POC. // PoC payload to bypass = "><svg><animate onbegin=prompt(document.domain) attributeName=x dur=1s> POC : https://drive.google.com/file/d/1tRRX5SGb_p11dWzvmsNTnpV6GfPl8Czj/view?usp=sharing
Impact
An attacker can use XSS to send a malicious script to any user.
We are processing your report and will contact the
pimcore
team within 24 hours.
2 months ago
We have contacted a member of the
pimcore
team and are waiting to hear back
2 months ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability has been assigned a CVE
to join this conversation