Miggo Logo

CVE-2019-7937: Magento 2 Community Edition XSS Vulnerability

4.8

CVSS Score
3.0

Basic Information

EPSS Score
0.3017%
Published
5/24/2022
Updated
2/12/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.1.0, < 2.1.182.1.18
magento/community-editioncomposer>= 2.2.0, < 2.2.92.2.9
magento/community-editioncomposer>= 2.3.0, < 2.3.22.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves stored XSS via product attribute storage, requiring privileges to modify attributes. The Save controller action is the primary entry point for processing attribute data. Historical Magento XSS vulnerabilities often stem from unsanitized input in admin controllers. The lack of output escaping in admin templates or input sanitization during attribute persistence would enable this exploit. The execute() method in the Save controller is the most logical point where unsanitized user input enters the system, matching the attack vector described.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* stor** *ross-sit* s*riptin* vuln*r**ility *xists in t** **min p*n*l o* M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.*, M***nto *.* prior to *.*.*. T*is *oul* ** *xploit** *y *n *ut**nti**t** us*r wit* privil***s to stor* pro*u*t *ttri*ut*s

Reasoning

T** vuln*r**ility involv*s stor** XSS vi* pro*u*t *ttri*ut* stor***, r*quirin* privil***s to mo*i*y *ttri*ut*s. T** `S*v*` *ontroll*r **tion is t** prim*ry *ntry point *or pro**ssin* *ttri*ut* **t*. *istori**l M***nto XSS vuln*r**iliti*s o*t*n st*m *