CVE-2023-5844

7.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to change passwords for any user account in Pimcore's admin-ui-classic-bundle without verification. It affects all installations using versions prior to 1.2.0 of this bundle, potentially compromising administrative access to Pimcore content management systems.

💻 Affected Systems

Products:
  • pimcore/admin-ui-classic-bundle
Versions: All versions prior to 1.2.0
Operating Systems: All operating systems running Pimcore
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Pimcore installations using the admin-ui-classic-bundle component. The vulnerability is in the bundle itself, not dependent on specific OS or configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of the Pimcore instance through administrative account compromise, leading to data theft, content manipulation, or system destruction.

🟠

Likely Case

Unauthorized password changes for user accounts, enabling privilege escalation and unauthorized access to sensitive content management functions.

🟢

If Mitigated

Limited impact with proper network segmentation and strong authentication controls, though the vulnerability still exists at the application layer.

🌐 Internet-Facing: HIGH - The vulnerability is in a web-accessible component and requires no authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: HIGH - Even internally, the lack of authentication requirement makes this easily exploitable by any internal user or compromised system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with publicly available details. No authentication required makes it trivial for attackers to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.0

Vendor Advisory: https://github.com/pimcore/admin-ui-classic-bundle/commit/498ac77e54541177be27b0c710e387c47b3836ea

Restart Required: No

Instructions:

1. Update the admin-ui-classic-bundle to version 1.2.0 or later using Composer: composer update pimcore/admin-ui-classic-bundle
2. Clear the Symfony cache: php bin/console cache:clear
3. Verify the update completed successfully

🔧 Temporary Workarounds

Disable admin-ui-classic-bundle

all

Temporarily disable the vulnerable bundle if immediate patching is not possible

Comment out or remove the bundle from config/bundles.php

Network isolation

linux

Restrict access to the Pimcore admin interface using firewall rules

iptables -A INPUT -p tcp --dport 443 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Pimcore admin interface
  • Enable multi-factor authentication for all administrative accounts as a compensating control

🔍 How to Verify

Check if Vulnerable:

Check the installed version of admin-ui-classic-bundle in composer.json or via composer show pimcore/admin-ui-classic-bundle

Check Version:

composer show pimcore/admin-ui-classic-bundle | grep versions

Verify Fix Applied:

Confirm version 1.2.0 or higher is installed: composer show pimcore/admin-ui-classic-bundle | grep versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual password change requests, especially for administrative accounts
  • Multiple failed login attempts followed by successful password changes

Network Indicators:

  • HTTP POST requests to password change endpoints without proper authentication headers
  • Unusual source IPs accessing admin password reset functionality

SIEM Query:

source="pimcore" AND (event="password_change" OR event="user_update") AND NOT user_agent="browser_agent"

🔗 References

📤 Share & Export