Very Low
CVE-2022-0510
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-0510
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Cross-site Scripting (XSS) – Reflected in Packagist pimcore/pimcore prior to 10.3.1.
Add Assessment
Ratings
-
Attacker ValueVery Low
-
ExploitabilityHigh
Technical Analysis
Description
Missing Sanitization of $item->getGroup()
(lines 864 and 1269) in fieldcollectionTreeAction/objectbrickTreeAction
functions in bundles/AdminBundle/Controller/Admin/DataObject/ClassController.php
allows Admin User to perform Source Code Injection through Stored Group Fields (in Object Bricks/Field Collection under settings module) resulting in Information Exposure (cookie theft).
Analysis
What makes this vulnerability stored is that the Group fields (for the listings under Object Bricks or Field Collection in the Settings Module) are saved to the database in the objectbrickUpdateAction function (serves the route /objectbrick-update
for the methods {“PUT”, “POST”}).
Example of the PUT request: https://demo.pimcore.com/admin/class/objectbrick-update
That means the patch only mitigates the XSS in the objectbrickTreeAction function (serves the route /objectbrick-tree
for the methods={“GET”, “POST”}).
Example of the GET request: https://demo.pimcore.com/admin/class/objectbrick-tree?_dc=1721102886220&grouped=1&node=0
The execution would happen in the Object Bricks/Field Collection
listings for Data Objects
in the Settings Module
(span with class x-tree-node-text
in a table with id treeview-record
)
Rating
The attack is relatively straightforward (XSS payloads are well documented and relatively easy to craft), requiring low privileges (anyone could access the Demo with privileged permissions and target other active users) and minimal complexity, though user interaction is needed.
The vulnerability can lead to limited data exposure and modification but does not significantly impact availability. Since the Demo resets every two hours (restoring all data to the default state), it is minimally valuable.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- pimcore
Products
- pimcore
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: