Miggo Logo

CVE-2019-8129: Magento Cross-Site Scripting via Signifyd Guarantee Option Translation Override

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.39525%
Published
5/24/2022
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.2, < 2.2.102.2.10
magento/community-editioncomposer>= 2.3, < 2.3.2-p12.3.2-p2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper output escaping of user-controlled translated strings. The Signifyd Guarantee feature uses a translation key that can be overridden via the admin panel. When the translated message is retrieved (via __() or equivalent) and rendered in the template without proper escaping (e.g., using $escaper->escapeHtml), it allows XSS payloads to execute. The block method responsible for delivering the message to the template would be the logical point of failure. While exact code isn't available, Magento's translation architecture and the vulnerability description strongly suggest this pattern.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xists in M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.* or *.*.*-p*. *n *ut**nti**t** us*r **n *xploit it *y inj**tin* *n *m****** *xpr*ssion into * tr*nsl*tion.

Reasoning

T** vuln*r**ility st*ms *rom improp*r output *s**pin* o* us*r-*ontroll** tr*nsl*t** strin*s. T** Si*ni*y* *u*r*nt** ***tur* us*s * tr*nsl*tion k*y t**t **n ** ov*rri***n vi* t** **min p*n*l. W**n t** tr*nsl*t** m*ss*** is r*tri*v** (vi* __() or *quiv