Pimcore is an Open Source Data & Experience Management Platform: PIM, MDM, CDP, DAM, DXP/CMS & Digital Commerce. A path traversal vulnerability exists in the `AssetController::importServerFilesAction`, which allows an attacker to overwrite or modify sensitive files by manipulating the pimcore_log parameter.This can lead to potential denial of service---key file overwrite.
The impact of this vulnerability allows attackers to: overwrite or modify sensitive files, potentially leading to unauthorized access, privilege escalation, or disclosure of confidential information. This could also cause a denial of service (DoS) if critical system files are overwritten or deleted.
References
Link | Resource |
---|---|
https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c | Patch |
https://github.com/pimcore/pimcore/security/advisories/GHSA-34hj-v8fm-x887 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-08-04 01:15
Updated : 2023-08-09 16:15
NVD link : CVE-2023-38708
Mitre link : CVE-2023-38708
CVE.ORG link : CVE-2023-38708
JSON object : View
Products Affected
pimcore
- pimcore
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')