CVE-2023-42817

CVSS 3.1 Score 5.4 of 10 (medium)

Details

Published Sep 25, 2023
Updated: Sep 26, 2023
CWE ID 79

Summary

CVE-2023-42817 affects Pimcore's admin-ui-classic-bundle, which is used for the Backend UI of Pimcore. A vulnerability was discovered where translation values containing the placeholder "%s" are parsed by sprintf() function instead of being output literally to the user. This issue can potentially be exploited by users with comparatively lower access levels who can access the translations, and a skilled attacker may utilize this vulnerability in the dialog box. The issue has been resolved in commit abd77392, which is included in version 1.1.2. Users are strongly encouraged to update to this version or apply the patch manually for enhanced security.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Pimcore Admin Classic Bundle

Affected Vendors

  • Pimcore

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-42817 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions