Snyk has a published code exploit for this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Local File Inclusion vulnerabilities in an interactive lesson.
Start learningUpgrade pimcore/pimcore
to version 6.8.8 or higher.
pimcore/pimcore is a content & product management framework (CMS/PIM/E-Commerce).
Affected versions of this package are vulnerable to Local File Inclusion. A Local FIle Inclusion vulnerability exists in the downloadCsvAction
function of the CustomReportController
class (bundles/AdminBundle/Controller/Reports/CustomReportController.php
). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=[filename]
. Since exportFile
variable is not sanitized, an attacker can exploit a local file inclusion vulnerability.
* Login in Pimcore
* Send a GET request to the endpoint: /admin/reports/custom-report/download-csv?exportFile=../../../../../../../../../../../../../../../etc/passwd to retrieve del passwd file of the Linux system. (Inside the request insert the header X-pimcore-csrf-token).