Pimcore.Multiselect.php.getFilterConditionExt.SQL.injection

description-logoDescription

This indicates an attack attempt to exploit an SQL Injection Vulnerability in Pimcore.
This vulnerability is due to improper input validation in the getFilterConditionExt function. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.

affected-products-logoAffected Products

Pimcore prior to 11.1.1

Impact logoImpact

System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/pimcore/pimcore/security/advisories/GHSA-72hh-xf79-429p

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2023-12-21 26.701
Modified
Default_action:pass:drop
2023-12-12 26.694
New