Miggo Logo

CVE-2019-8142:
Magento 2 Community Edition XSS Vulnerability

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.39787%
Published
5/24/2022
Updated
2/2/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.2.0, < 2.2.102.2.10
magento/community-editioncomposer>= 2.3.0, < 2.3.2-p12.3.2-p1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsanitized handling of payment method titles during configuration and rendering. Magento's payment method configuration flow involves saving user-provided titles (via admin controllers) and displaying them in multiple contexts. The AbstractMethod::getTitle() is a core method for retrieving payment titles, and Container::setMethodForm is a key rendering point. The absence of output escaping in these critical points (as implied by the XSS nature) makes them likely candidates. Confidence is high for the rendering function due to XSS patterns, and medium for the getter due to lack of explicit patch details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* stor** *ross-sit* s*riptin* (XSS) vuln*r**ility *xists in M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.* or *.*.*-p*. *n *ut**nti**t** us*r **n inj**t *r*itr*ry J*v*S*ript *o** vi* titl* o* *n or**r w**n *on*i*urin* s*l*s p*ym*nt m*t*o*s *

Reasoning

T** vuln*r**ility st*ms *rom uns*nitiz** **n*lin* o* p*ym*nt m*t*o* titl*s *urin* *on*i*ur*tion *n* r*n**rin*. M***nto's p*ym*nt m*t*o* *on*i*ur*tion *low involv*s s*vin* us*r-provi*** titl*s (vi* **min *ontroll*rs) *n* *ispl*yin* t**m in multipl* *o