Miggo Logo

CVE-2020-24912: qcubed reflected cross-site scripting (XSS) vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.95381%
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
qcubed/qcubedcomposer<= 3.1.13.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs in profile.php where the stQuery parameter is part of serialized POST data. The code unserializes/base64-decodes user input and directly outputs the strQuery value using _p($strQuery, false). The second parameter 'false' in _p() likely disables HTML escaping, allowing injected scripts to execute. The GitHub patch shows the vulnerability was mitigated by adding proper escaping and hardening input handling in this file.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r**l**t** *ross-sit* s*riptin* (XSS) vuln*r**ility in q*u*** (*ll v*rsions in*lu*in* *.*.*) in pro*il*.p*p vi* t** stQu*ry-p*r*m*t*r *llows un*ut**nti**t** *tt**k*rs to st**l s*ssions o* *ut**nti**t** us*rs.

Reasoning

T** vuln*r**ility o**urs in pro*il*.p*p w**r* t** stQu*ry p*r*m*t*r is p*rt o* s*ri*liz** POST **t*. T** *o** uns*ri*liz*s/**s***-***o**s us*r input *n* *ir**tly outputs t** strQu*ry v*lu* usin* _p($strQu*ry, **ls*). T** s**on* p*r*m*t*r '**ls*' in _