CVE-2024-49370

Pimcore is an open source data and experience management platform. When a PortalUserObject is connected to a PimcoreUser and "Use Pimcore Backend Password" is set to true, the change password function in Portal Profile sets the new password. Prior to Pimcore portal engine versions 4.1.7 and 3.1.16, the password is then set without hashing so it can be read by everyone. Everyone who combines PortalUser to PimcoreUsers and change passwords via profile settings could be affected. Versions 4.1.7 and 3.1.16 of the Pimcore portal engine fix the issue.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*
cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*

History

06 Nov 2024, 22:31

Type Values Removed Values Added
CPE cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*
CWE CWE-256 NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
First Time Pimcore pimcore
Pimcore
References () https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc - () https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc - Exploit, Vendor Advisory

23 Oct 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-23 15:15

Updated : 2024-11-06 22:31


NVD link : CVE-2024-49370

Mitre link : CVE-2024-49370


JSON object : View

Products Affected

pimcore

  • pimcore