Miggo Logo

CVE-2017-20064: Code injection in Elefant CMS

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.5799%
Published
6/21/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
elefant/cmscomposer< 1.3.131.3.13

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in template processing where user input containing {{passthru('id')}} gets executed as PHP code. This indicates: 1) The template engine improperly evaluates PHP constructs in user-controlled layout content 2) The handler responsible for /designer/add/layout endpoint fails to sanitize or restrict executable syntax 3) The presence of dangerous functions like eval() or similar dynamic code execution mechanisms in the template parsing logic. While exact code isn't available, the PoC and CWE-94 classification confirm unvalidated code generation from user input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in *l***nt *MS *.*.**-R*. It **s ***n ***l*r** *s *riti**l. *****t** *y t*is vuln*r**ility is *n unknown *un*tion*lity o* t** *il* /**si*n*r/***/l*yout. T** m*nipul*tion l***s to *o** inj**tion. T** *tt**k **n ** l*un**** r*

Reasoning

T** vuln*r**ility m*ni**sts in t*mpl*t* pro**ssin* w**r* us*r input *ont*inin* `{{p*sst*ru('i*')}}` **ts *x**ut** *s P*P *o**. T*is in*i**t*s: *) T** t*mpl*t* *n*in* improp*rly *v*lu*t*s P*P *onstru*ts in us*r-*ontroll** l*yout *ont*nt *) T** **n*l*r