Miggo Logo

CVE-2020-10963: FrozenNode Laravel-Administrator unrestricted file upload

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.95425%
Published
5/24/2022
Updated
4/23/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
frozennode/administratorcomposer<= 5.0.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs at the admin/tips_image/image/file_upload endpoint which handles file uploads. While exact source code isn't available, the exploit requires: 1. Lack of proper file content validation (accepts PHP code in files with GIF headers) 2. Failure to properly validate/sanitize file extensions (.php allowed) 3. Storing uploaded files in web-accessible locations. The controller method handling this endpoint is directly responsible for these missing security checks, making it the primary vulnerable function. The high confidence comes from the well-documented exploit pattern matching CWE-434 and the specific attack vector described (PHP-in-GIF with .php extension).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*roz*nNo** L*r*v*l-**ministr*tor t*rou** *.*.** *llows unr*stri*t** *il* uplo** (*n* *ons*qu*ntly R*mot* *o** *x**ution) vi* `**min/tips_im***/im***/*il*_uplo**` im*** uplo** wit* P*P *ont*nt wit*in * *I* im*** t**t **s t** `.p*p` *xt*nsion. NOT*: t*

Reasoning

T** vuln*r**ility o**urs *t t** **min/tips_im***/im***/*il*_uplo** *n*point w*i** **n*l*s *il* uplo**s. W*il* *x**t sour** *o** isn't *v*il**l*, t** *xploit r*quir*s: *. L**k o* prop*r *il* *ont*nt v*li**tion (****pts P*P *o** in *il*s wit* *I* *****