Miggo Logo

CVE-2014-125107: Corveda PHPSandbox Protection Mechanism Failure vulnerability

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.23458%
Published
12/19/2023
Updated
1/3/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
corveda/phpsandboxcomposer< 1.3.51.3.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from insufficient protection around SandboxedString handling. The commit adds overrides for multiple PHP functions (var_dump, print_r, var_export, intval, floatval, is_string, etc.) to properly handle SandboxedString objects. The presence of these new wrapper functions in the patch indicates the original implementations in PHPSandbox.php did not properly mask SandboxedString instances, allowing sandboxed code to manipulate or inspect protected strings through these functions. The addition of ArrayAccess implementation to SandboxedString in the patch also suggests previous string manipulation vulnerabilities existed.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in *orv*** P*PS*n**ox *.*.* *n* *l*ssi*i** *s *riti**l. *****t** *y t*is issu* is som* unknown *un*tion*lity o* t** *ompon*nt Strin* **n*l*r. T** m*nipul*tion l***s to prot**tion m****nism **ilur*. T** *tt**k m*y ** l*un****

Reasoning

T** vuln*r**ility st*mm** *rom insu**i*i*nt prot**tion *roun* S*n**ox**Strin* **n*lin*. T** *ommit ***s ov*rri**s *or multipl* P*P *un*tions (v*r_*ump, print_r, v*r_*xport, intv*l, *lo*tv*l, is_strin*, *t*.) to prop*rly **n*l* S*n**ox**Strin* o*j**ts