CVE-2020-15886:
MunkiReport reportdata module SQL injection vulnerability
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.583%
CWE
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
munkireport/reportdata | composer | < 3.5 | 3.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the handling of the 'req' parameter in the IP endpoint controller. Evidence from the advisory shows:
- The attack vector is specifically through the 'req' parameter
- The patch in reportdata v3.5 removed the 'req' parameter entirely
- The vulnerability type (SQLi) indicates direct concatenation of user input into SQL queries
- Controller files in PHP MVC frameworks typically contain endpoint handling logic
- The CWE-89 classification confirms improper SQL query construction