Loading HuntDB...

GHSA-c8hj-w239-5gvf

GitHub Security Advisory

pimcore/admin-ui-classic-bundle Full Path Disclosure via re-export document

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view.

In the case of pimcore, the fopen() function here doesn't have an error handle when the file doesn't exist on the server so the server response raises the full path "fopen(/var/www/html/var/tmp/export-{ uniqe id}.csv)"

### Patches
Apply patch https://github.com/pimcore/admin-ui-classic-bundle/commit/10d178ef771097604a256c1192b098af9ec57a87.patch

### Workarounds
Update to version 1.2.1 or apply [patches](https://github.com/pimcore/admin-ui-classic-bundle/commit/10d178ef771097604a256c1192b098af9ec57a87.patch) manually

### References
https://huntr.com/bounties/4af4db18-9fd4-43e9-8bc6-c88aaf76839c/

Affected Packages

Packagist pimcore/admin-ui-classic-bundle
Affected versions: 0 (fixed in 1.2.1)

Related CVEs

Key Information

GHSA ID
GHSA-c8hj-w239-5gvf
Published
November 15, 2023 2:49 PM
Last Modified
November 15, 2023 11:22 PM
CVSS Score
5.0 /10
Primary Ecosystem
Packagist
Primary Package
pimcore/admin-ui-classic-bundle
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 12, 2025 6:34 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.