{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-37280","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-06-29T19:35:26.441Z","datePublished":"2023-07-11T18:19:37.245Z","dateUpdated":"2024-10-23T15:18:40.802Z"},"containers":{"cna":{"title":"Pimcore admin UI vulnerable to Cross-site Scripting in two factor authentication setup page","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-hqv9-6jqw-9g8m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-hqv9-6jqw-9g8m"},{"name":"https://github.com/pimcore/admin-ui-classic-bundle/pull/147","tags":["x_refsource_MISC"],"url":"https://github.com/pimcore/admin-ui-classic-bundle/pull/147"},{"name":"https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743","tags":["x_refsource_MISC"],"url":"https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743"}],"affected":[{"vendor":"pimcore","product":"admin-ui-classic-bundle","versions":[{"version":"< 1.0.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-07-11T18:19:37.245Z"},"descriptions":[{"lang":"en","value":"Pimcore Admin Classic Bundle provides a Backend UI for Pimcore based on the ExtJS framework. An admin who has not setup two factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts/HTML content. This vulnerability has been patched in version 1.0.3."}],"source":{"advisory":"GHSA-hqv9-6jqw-9g8m","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:09:34.024Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-hqv9-6jqw-9g8m","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-hqv9-6jqw-9g8m"},{"name":"https://github.com/pimcore/admin-ui-classic-bundle/pull/147","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/pimcore/admin-ui-classic-bundle/pull/147"},{"name":"https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/pimcore/admin-ui-classic-bundle/commit/5fcd19bdc89a3fe4cb8ad8c356590e1e4740c743"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T15:18:20.576840Z","id":"CVE-2023-37280","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-23T15:18:40.802Z"}}]}}