Skip to content

Commit b34de70

Browse files
Merge pull request #6399 from github/tjuyuxinzhang-GHSA-6f58-j323-6472
2 parents 14aba57 + 14b34e7 commit b34de70

File tree

1 file changed

+70
-0
lines changed

1 file changed

+70
-0
lines changed
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6f58-j323-6472",
4+
"modified": "2023-11-14T21:47:36Z",
5+
"published": "2023-10-31T22:23:18Z",
6+
"aliases": [
7+
"CVE-2023-5844"
8+
],
9+
"summary": "pimcore/admin-ui-classic-bundle Unverified Password Change",
10+
"details": "### Impact\nAs old password can be set as new password , it is considered as password policy violation.\n\nPimcore is not enforcing strict password policy which allow attacker to set old password as new password\n\nProof of Concept\n1. Go to Admin link\n2. login and click on -> \"User | My Profile\".\n3. Go to change password now put old password as new password and click save.\n\n### Patches\nhttps://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea.patch\n\n### Workarounds\nUpdate to version 1.2.0 or apply this patches manually\nhttps://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea.patch\n\n### References\nhttps://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021/\n",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "pimcore/admin-ui-classic-bundle"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.2.0-RC1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-6f58-j323-6472"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5844"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/pimcore/admin-ui-classic-bundle"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-287",
63+
"CWE-620"
64+
],
65+
"severity": "MODERATE",
66+
"github_reviewed": true,
67+
"github_reviewed_at": "2023-10-31T22:23:18Z",
68+
"nvd_published_at": "2023-10-30T11:15:39Z"
69+
}
70+
}

0 commit comments

Comments
 (0)