Miggo Logo

CVE-2019-8108:
Magento Broken authentication and session managememt

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.30142%
Published
5/24/2022
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.2, < 2.2.102.2.10
magento/community-editioncomposer>= 2.3, < 2.3.2-p22.3.2-p2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description indicates authenticated users could manipulate session validation settings. The most logical attack vector involves modifying system configuration values governing session management. The Save controller in Magento's configuration system is responsible for persisting these settings. The vulnerability likely exists because this endpoint either lacked proper authorization checks for sensitive session-related configuration options or allowed unauthorized scope modifications (e.g., store-view level changes by users without adequate permissions). This aligns with CWE-287 (Improper Authentication) as it relates to failure to properly verify privileges when modifying security controls.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Ins**ur* *ut**nti**tion *n* s*ssion m*n***m*nt vuln*r**ility *xists in M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.* or *.*.*-p*. *n *ut**nti**t** us*r **n m*nipul*t* s*ssion v*li**tion s*ttin* *or * stor**ront t**t l***s to ins**ur* *ut**n

Reasoning

T** vuln*r**ility **s*ription in*i**t*s *ut**nti**t** us*rs *oul* m*nipul*t* s*ssion `v*li**tion` s*ttin*s. T** most lo*i**l *tt**k v**tor involv*s mo*i*yin* syst*m `*on*i*ur*tion` v*lu*s *ov*rnin* s*ssion m*n***m*nt. T** `S*v*` *ontroll*r in M***nto