{ "id": "CVE-2024-25625", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-19T16:15:52.060", "lastModified": "2024-02-20T19:50:53.960", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent." }, { "lang": "es", "value": "El paquete Admin Classic de Pimcore proporciona una interfaz de usuario de backend para Pimcore. Se ha descubierto una posible vulnerabilidad de seguridad en `pimcore/admin-ui-classic-bundle` anterior a la versi\u00f3n 1.3.4. La vulnerabilidad implica una inyecci\u00f3n de encabezado de host en la funci\u00f3n `invitationLinkAction` del UserController, espec\u00edficamente en la forma en que `$loginUrl` conf\u00eda en la entrada del usuario. El encabezado del host de las solicitudes HTTP entrantes se utiliza de forma insegura al generar URL. Un atacante puede manipular el encabezado del host HTTP en solicitudes al ednpoint /admin/user/invitationlink, lo que genera la generaci\u00f3n de URL con el dominio del atacante. De hecho, si se inyecta un encabezado de host en la solicitud POST, el par\u00e1metro $loginURL se construye con este encabezado de host no validado. Luego se utiliza para enviar un correo electr\u00f3nico de invitaci\u00f3n al usuario proporcionado. Esta vulnerabilidad se puede utilizar para realizar ataques de phishing haciendo que las URL de los correos electr\u00f3nicos con enlaces de invitaci\u00f3n apunten a un dominio controlado por el atacante. La versi\u00f3n 1.3.4 contiene un parche para la vulnerabilidad. Los fabricantes recomiendan validar el encabezado del host y asegurarse de que coincida con el dominio de la aplicaci\u00f3n. Tambi\u00e9n ser\u00eda beneficioso utilizar un host o nombre de host confiable predeterminado si el encabezado del host entrante no se reconoce o est\u00e1 ausente." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.7, "impactScore": 5.8 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-74" } ] } ], "references": [ { "url": "https://github.com/pimcore/admin-ui-classic-bundle/commit/b9fee9d383fc73dbd5e1d98dbb0ff3266d6b5a82", "source": "security-advisories@github.com" }, { "url": "https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx", "source": "security-advisories@github.com" } ] }