ghsa-hqv9-6jqw-9g8m
Vulnerability from github
Summary
Unauthenticated HTML Injection / XSS Possible. Conditions: 2factor authentication must not set before
Vulnerable Endpoint: /admin/login/2fa-setup
Vulnerable Param: error= How it works, So basically any admin, who has not setup 2 factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts / HTML Contents.
Another potential attack vector, as it's a 2fa page and it has QR Code, attacker can replace this QR Code with something he has, leading to increase threat to the admin.
This attack can be used to execute arbitrary scripts or HTML Injection, causing the target application to execute these resulting in cookie steeling, defacement or Injecting phishing URLs on the target application.
Patches
Update to version 1.0.3 or apply this patches manually https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743.patch
Workarounds
Apply patches manually: https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743.patch
References
https://huntr.dev/bounties/1fa1cc3b-75ff-4d34-99ae-4a705eb623e7/
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "pimcore/admin-ui-classic-bundle" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.0.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-37280" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2023-07-12T17:29:02Z", "nvd_published_at": "2023-07-11T19:15:09Z", "severity": "MODERATE" }, "details": "### Summary\n\nUnauthenticated HTML Injection / XSS Possible.\nConditions: 2factor authentication must not set before\n\n Vulnerable Endpoint: /admin/login/2fa-setup\n\n Vulnerable Param: error=\nHow it works, So basically any admin, who has not setup 2 factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts / HTML Contents.\n\nAnother potential attack vector, as it\u0027s a 2fa page and it has QR Code, attacker can replace this QR Code with something he has, leading to increase threat to the admin.\n\nThis attack can be used to execute arbitrary scripts or HTML Injection, causing the target application to execute these resulting in cookie steeling, defacement or Injecting phishing URLs on the target application.\n\n### Patches\nUpdate to version 1.0.3 or apply this patches manually\nhttps://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743.patch\n\n### Workarounds\nApply patches manually: https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743.patch\n\n### References\nhttps://huntr.dev/bounties/1fa1cc3b-75ff-4d34-99ae-4a705eb623e7/\n", "id": "GHSA-hqv9-6jqw-9g8m", "modified": "2023-07-20T14:59:47Z", "published": "2023-07-12T17:29:02Z", "references": [ { "type": "WEB", "url": "https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-hqv9-6jqw-9g8m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37280" }, { "type": "WEB", "url": "https://github.com/pimcore/admin-ui-classic-bundle/pull/147" }, { "type": "WEB", "url": "https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743" }, { "type": "PACKAGE", "url": "https://github.com/pimcore/admin-ui-classic-bundle" }, { "type": "WEB", "url": "https://huntr.dev/bounties/1fa1cc3b-75ff-4d34-99ae-4a705eb623e7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Pimcore admin UI vulnerable to Cross-site Scripting in 2 factor authentication setup page" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.