Miggo Logo

CVE-2020-26768: Formstone Vulnerable to Reflected XSS

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.67644%
Published
5/24/2022
Updated
4/1/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
formstonenpm<= 1.4.161.4.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from procedural code in upload-target.php and upload-chunked.php that directly outputs user-controlled input (from $_POST and $_FILES) without proper sanitization. While the commit diff shows the introduction of a sanitize() function in the patched version, the vulnerable versions (<=1.4.16) lacked this protection. The insecure code exists in the global scope of these PHP scripts rather than within specific named functions, making it impossible to identify discrete vulnerable functions with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ormston* <=*.*.** is vuln*r**l* to * R**l**t** *ross-Sit* S*riptin* (XSS) vuln*r**ility **us** *y improp*r v*li**tion o* us*r suppli** input in t** `uplo**-t*r**t.p*p` *n* `uplo**-**unk**.p*p` *il*s. * r*mot* *tt**k*r *oul* *xploit t*is vuln*r**ilit

Reasoning

T** vuln*r**ility st*ms *rom pro***ur*l *o** in uplo**-t*r**t.p*p *n* uplo**-**unk**.p*p t**t *ir**tly outputs us*r-*ontroll** input (*rom $_POST *n* $_*IL*S) wit*out prop*r s*nitiz*tion. W*il* t** *ommit *i** s*ows t** intro*u*tion o* * s*nitiz*() *