CVE-2020-15885: MunkiReport Cross-Site Scripting (XSS) Filter Bypass On Comment
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50811%
CWE
Published
5/24/2022
Updated
11/15/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| munkireport/comment | composer | < 4.1 | 4.1 |
| munkireport/managedinstalls | composer | < 2.6 | 2.6 |
| munkireport/munkireport | composer | >= 2.5.3, < 5.6.3 | 5.6.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided commit diff for the managedinstalls module shows critical changes to input handling. In managedinstalls_controller.php, rawurldecode() was replaced with addslashes() to escape quotes, and in managedinstalls_functions.js, decodeURIComponent() was added to safely handle URL parameters. These fixes directly address XSS vulnerabilities caused by unescaped user input being reflected in the UI. The vulnerability title specifically mentions the comment module, but the analyzed commit and diff pertain to the managedinstalls module, which is also listed as affected in the advisory. The changes in these functions align with the described XSS filter bypass mechanism, confirming their role in the vulnerability.