cve/2024/CVE-2024-29197.md

22 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-29197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29197)
![](https://img.shields.io/static/v1?label=Product&message=pimcore&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%2011.0.0%2C%20%3C%2011.1.6.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Pimcore is an Open Source Data & Experience Management Platform. Any call with the query argument `?pimcore_preview=true` allows to view unpublished sites. In previous versions of Pimcore, session information would propagate to previews, so only a logged in user could open a preview. This no longer applies. Previews are broad open to any user and with just the hint of a restricted link one could gain access to possible confident / unreleased information. This vulnerability is fixed in 11.2.2 and 11.1.6.1.
### POC
#### Reference
- https://github.com/pimcore/pimcore/security/advisories/GHSA-5737-rqv4-v445
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/Schnaidr/CVE-2019-9641-php-RCE
2024-05-25 21:48:12 +02:00
- https://github.com/Schnaidr/CVE-2024-2856-Stack-overflow-EXP
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/mansploit/CVE-2024-29197-exploit
- https://github.com/nomi-sec/PoC-in-GitHub