Miggo Logo

CVE-2020-15887: MunkiReport Software Update module is vulnerable to SQL injection

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.583%
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
munkireport/softwareupdatecomposer< 1.61.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly identifies the '/module/softwareupdate/get_tab_data/' endpoint's 'last' parameter as the injection vector. The module's security patch (v1.6) and associated release notes confirm SQL injection fixes. While the exact code isn't visible, the pattern matches classic SQL injection vulnerabilities where user input is directly concatenated into SQL queries. The endpoint handler in softwareupdate_controller.php would logically be responsible for processing this parameter and executing database operations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* SQL inj**tion vuln*r**ility in so*tw*r*up**t*_*ontroll*r.p*p in t** So*tw*r* Up**t* mo*ul* ***or* *.* *or MunkiR*port *llows *tt**k*rs to *x**ut* *r*itr*ry SQL *omm*n*s vi* t** l*st URL p*r*m*t*r o* t** `/mo*ul*/so*tw*r*up**t*/**t_t**_**t*/` *n*poi

Reasoning

T** vuln*r**ility **s*ription *xpli*itly i**nti*i*s t** '/mo*ul*/so*tw*r*up**t*/**t_t**_**t*/' *n*point's 'l*st' p*r*m*t*r *s t** inj**tion v**tor. T** mo*ul*'s s**urity p*t** (v*.*) *n* *sso*i*t** r*l**s* not*s *on*irm SQL inj**tion *ix*s. W*il* t**