CVE-2022-46157

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-46157
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46157.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-46157
Aliases
Withdrawn
2024-05-08T06:52:32.208868Z
Published
2022-12-09T21:15:13Z
Modified
2023-12-06T00:47:40.377877Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Akeneo PIM is an open source Product Information Management (PIM). Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. Users are advised to upgrade. Users unable to upgrade may Replace any reference to <FilesMatch \.php$> in their apache httpd configurations with: <Location "/index.php">.

References

Affected packages

Git / github.com/akeneo/pim-community-dev

Affected ranges

Type
GIT
Repo
https://github.com/akeneo/pim-community-dev
Events

Affected versions

v5.*

v5.0.100
v5.0.101
v5.0.102
v5.0.103
v5.0.104
v5.0.105
v5.0.106
v5.0.107
v5.0.108
v5.0.109
v5.0.110
v5.0.111
v5.0.112
v5.0.113
v5.0.114
v5.0.115
v5.0.116
v5.0.64
v5.0.65
v5.0.66
v5.0.67
v5.0.68
v5.0.69
v5.0.70
v5.0.71
v5.0.72
v5.0.73
v5.0.74
v5.0.75
v5.0.76
v5.0.77
v5.0.78
v5.0.79
v5.0.80
v5.0.81
v5.0.82
v5.0.83
v5.0.84
v5.0.85
v5.0.86
v5.0.87
v5.0.88
v5.0.89
v5.0.90
v5.0.91
v5.0.92
v5.0.93
v5.0.94
v5.0.95
v5.0.96
v5.0.97
v5.0.98
v5.0.99

v6.*

v6.0.0
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.16
v6.0.17
v6.0.18
v6.0.19
v6.0.2
v6.0.20
v6.0.21
v6.0.22
v6.0.23
v6.0.24
v6.0.25
v6.0.26
v6.0.27
v6.0.28
v6.0.29
v6.0.3
v6.0.30
v6.0.31
v6.0.32
v6.0.33
v6.0.34
v6.0.35
v6.0.36
v6.0.37
v6.0.38
v6.0.39
v6.0.4
v6.0.40
v6.0.41
v6.0.42
v6.0.43
v6.0.44
v6.0.45
v6.0.46
v6.0.47
v6.0.48
v6.0.49
v6.0.5
v6.0.50
v6.0.51
v6.0.52
v6.0.6
v6.0.7
v6.0.8
v6.0.9