GHSA-3QPQ-6W89-F7MX
Vulnerability from github – Published: 2024-02-20 23:44 – Updated: 2024-02-20 23:44Overview
A potential security vulnerability discovered in pimcore/admin-ui-classic-bundle version up to v1.3.3 . The vulnerability involves a Host Header Injection in the invitationLinkAction function of the UserController, specifically in the way $loginUrl trusts user input.
Details
The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain.
In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user.
Here is an excerpt from the affected section of UserController.php file:
// /src/Controller/Admin/UserController.php
public function invitationLinkAction(Request $request, TranslatorInterface $translator): JsonResponse
{
// ..snip..
$token = Tool\Authentication::generateTokenByUser($user);
$loginUrl = $this->generateCustomUrl([
'token' => $token,
'reset' => true,
]);
try {
$mail = Tool::getMail([$user->getEmail()], 'Pimcore login invitation for ' . Tool::getHostname());
$mail->setIgnoreDebugMode(true);
$mail->text("Login to pimcore and change your password using the following link. This temporary login link will expire in 24 hours: \r\n\r\n" . $loginUrl);
$mail->send();
// ..snip..
}
// ..snip..
private function generateCustomUrl(array $params, string $fallbackUrl = 'pimcore_admin_login_check', int $referenceType = UrlGeneratorInterface::ABSOLUTE_URL): string
{
try {
$adminEntryPointRoute = $this->getParameter('pimcore_admin.custom_admin_route_name');
//try to generate invitation link for custom admin point
$loginUrl = $this->generateUrl($adminEntryPointRoute, $params, $referenceType);
} catch (\Exception $e) {
//use default login check for invitation link
$loginUrl = $this->generateUrl($fallbackUrl, $params, $referenceType);
}
return $loginUrl;
}
The $loginUrl variable is constructed using the generateCustomUrl function. If an attacker injects a malicious host header into a POST request, the resulting $loginUrl will include the malicious domain, and this link is then sent via email to the user.
Proof of Concept
Here is an example of a request that exploits this vulnerability:
POST /admin/user/invitationlink HTTP/1.1
Host: attacker-domain.evil
Cookie: PHPSESSID=test
X-pimcore-extjs-version-major: 7
X-pimcore-extjs-version-minor: 0
X-Requested-With: XMLHttpRequest
X-pimcore-csrf-token: 961c37cf60edfdc2eec5a705cb048aaa8c32804d
username=[username of a valid user]
The URL in the email will look like: http://attacker-domain.evil/admin/login/login?token=[TOKEN]
Impact
This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain.
Remediation
We recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.
Similar vulnerability (CVE-2024-23648) has been fixed in this project (https://github.com/pimcore/admin-ui-classic-bundle/commit/70f2205b5a5ea9584721d4f3e803f4d0dd5e4655)
Credit
Discovered by @v0lck3r (Oussama RAHALI), Feb 2024.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "pimcore/admin-ui-classic-bundle"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-25625"
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"github_reviewed": true,
"github_reviewed_at": "2024-02-20T23:44:20Z",
"nvd_published_at": "2024-02-19T16:15:52Z",
"severity": "HIGH"
},
"details": "## Overview\n\nA potential security vulnerability discovered in `pimcore/admin-ui-classic-bundle` version up to v1.3.3 . The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. \n\n## Details\n\nThe host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker\u0027s domain. \n\nIn fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user.\n\nHere is an excerpt from the affected section of UserController.php file:\n```\n// /src/Controller/Admin/UserController.php \n public function invitationLinkAction(Request $request, TranslatorInterface $translator): JsonResponse\n {\n // ..snip..\n $token = Tool\\Authentication::generateTokenByUser($user);\n $loginUrl = $this-\u003egenerateCustomUrl([\n \u0027token\u0027 =\u003e $token,\n \u0027reset\u0027 =\u003e true,\n ]);\n\n try {\n $mail = Tool::getMail([$user-\u003egetEmail()], \u0027Pimcore login invitation for \u0027 . Tool::getHostname());\n $mail-\u003esetIgnoreDebugMode(true);\n $mail-\u003etext(\"Login to pimcore and change your password using the following link. This temporary login link will expire in 24 hours: \\r\\n\\r\\n\" . $loginUrl);\n $mail-\u003esend();\n // ..snip..\n }\n // ..snip..\n private function generateCustomUrl(array $params, string $fallbackUrl = \u0027pimcore_admin_login_check\u0027, int $referenceType = UrlGeneratorInterface::ABSOLUTE_URL): string\n {\n try {\n $adminEntryPointRoute = $this-\u003egetParameter(\u0027pimcore_admin.custom_admin_route_name\u0027);\n\n //try to generate invitation link for custom admin point\n $loginUrl = $this-\u003egenerateUrl($adminEntryPointRoute, $params, $referenceType);\n } catch (\\Exception $e) {\n //use default login check for invitation link\n $loginUrl = $this-\u003egenerateUrl($fallbackUrl, $params, $referenceType);\n }\n\n return $loginUrl;\n }\n```\nThe $loginUrl variable is constructed using the generateCustomUrl function. If an attacker injects a malicious host header into a POST request, the resulting $loginUrl will include the malicious domain, and this link is then sent via email to the user.\n\n## Proof of Concept\n\nHere is an example of a request that exploits this vulnerability:\n```\nPOST /admin/user/invitationlink HTTP/1.1 \nHost: attacker-domain.evil \nCookie: PHPSESSID=test\nX-pimcore-extjs-version-major: 7\nX-pimcore-extjs-version-minor: 0\nX-Requested-With: XMLHttpRequest\nX-pimcore-csrf-token: 961c37cf60edfdc2eec5a705cb048aaa8c32804d\n\nusername=[username of a valid user]\n```\n\n\nThe URL in the email will look like: `http://attacker-domain.evil/admin/login/login?token=[TOKEN]`\n\n## Impact\n\nThis vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain.\n\n## Remediation\n\nWe recommend validating the host header and ensuring it matches the application\u0027s domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.\n\nSimilar vulnerability (CVE-2024-23648) has been fixed in this project (https://github.com/pimcore/admin-ui-classic-bundle/commit/70f2205b5a5ea9584721d4f3e803f4d0dd5e4655)\n\n## Credit\n\nDiscovered by @v0lck3r (Oussama RAHALI), Feb 2024.",
"id": "GHSA-3qpq-6w89-f7mx",
"modified": "2024-02-20T23:44:20Z",
"published": "2024-02-20T23:44:20Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25625"
},
{
"type": "WEB",
"url": "https://github.com/pimcore/admin-ui-classic-bundle/commit/b9fee9d383fc73dbd5e1d98dbb0ff3266d6b5a82"
},
{
"type": "PACKAGE",
"url": "https://github.com/pimcore/admin-ui-classic-bundle"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "Pimcore Host Header Injection in user invitation link"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.