Miggo Logo

CVE-2019-7912:
Magento Filter extension bypass via crafted store configuration keys

7.2

CVSS Score
3.0

Basic Information

EPSS Score
0.55412%
Published
5/24/2022
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.1, < 2.1.182.1.18
magento/community-editioncomposer>= 2.2, < 2.2.92.2.9
magento/community-editioncomposer>= 2.3, < 2.3.22.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper validation of user-controlled configuration values that govern file upload restrictions. Key functions identified are those responsible for 1) retrieving allowed extensions from config.php (ImageUploader::getAllowedExtensions), and 2) enforcing these restrictions during upload (Uploader::_setUploadFile). These functions become vulnerable when configuration values are manipulated to empty, as they lack fallback mechanisms to enforce minimum security constraints. The assessment aligns with Magento's architecture where configuration-driven upload filters are common, and matches the CWE-434 pattern of unrestricted uploads via missing validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *il* uplo** *ilt*r *yp*ss *xists in M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.*, M***nto *.* prior to *.*.*. T*is **n ** *xploit** *y *n *ut**nti**t** us*r wit* **min privil***s to **it *on*i*ur*tion k*ys to r*mov* *il* *xt*nsion *ilt*r

Reasoning

T** vuln*r**ility st*ms *rom improp*r `v*li**tion` o* us*r-*ontroll** *on*i*ur*tion v*lu*s t**t *ov*rn *il* uplo** r*stri*tions. K*y *un*tions i**nti*i** *r* t*os* r*sponsi*l* *or *) r*tri*vin* *llow** *xt*nsions *rom `*on*i*.p*p` (Im***Uplo***r::**t