Miggo Logo

CVE-2019-7874:
Magento 2 Community Edition XSS Vulnerability

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.07392%
Published
5/24/2022
Updated
2/12/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.1.0, < 2.1.182.1.18
magento/community-editioncomposer>= 2.2.0, < 2.2.92.2.9
magento/community-editioncomposer>= 2.3.0, < 2.3.22.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly mentions CSRF leading to role deletion. In Magento's architecture, admin actions typically require form key validation. The absence of this check in the role deletion controller (despite being an admin action) would allow CSRF attacks. This matches the pattern where critical admin actions without CSRF protection are vulnerable to state-changing forged requests.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-sit* r*qu*st *or**ry vuln*r**ility *xists in M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.*, M***nto *.* prior to *.*.*. T*is **n r*sult in unint*n*** **l*tion o* us*r rol*s.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly m*ntions *SR* l***in* to rol* **l*tion. In M***nto's *r**it**tur*, **min **tions typi**lly r*quir* *orm k*y v*li**tion. T** **s*n** o* t*is ****k in t** rol* **l*tion *ontroll*r (**spit* **in* *n **min **tion)