
Cloud Vulnerability DB
A community-led vulnerabilities database
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore that allows users to create zip files from available files on the site. In versions prior to 1.3.2, the parameter 'selectedIds' in the downloadAsZipAddFilesAction method was susceptible to SQL Injection. This vulnerability was assigned CVE-2024-23646 and was discovered on January 24, 2024 (GitHub Advisory).
The vulnerability exists because while downloadAsZipJobsAction properly escapes parameters, downloadAsZipAddFilesAction did not implement proper parameter escaping. The issue allows SQL injection through the 'selectedIds' parameter when creating zip files. The vulnerability was fixed by adding proper parameter quoting using $db->quote() for each selected ID in the downloadAsZipAddFilesAction method (GitHub Commit).
Any backend user with basic permissions can execute arbitrary SQL statements through this vulnerability. This allows attackers to potentially alter any data in the database or escalate their privileges to admin level (GitHub Advisory).
The vulnerability has been patched in version 1.3.2 of the Admin Classic Bundle. Users should upgrade to this version or later to receive the fix. The patch implements proper SQL parameter quoting for the selectedIds parameter (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."