Miggo Logo

CVE-2020-5237:
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.90703%
Published
2/18/2020
Updated
2/7/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
oneup/uploader-bundlecomposer>= 2.0.0, < 2.1.52.1.5
oneup/uploader-bundlecomposer>= 1.0.0, < 1.9.31.9.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper handling of user-controlled parameters in path construction. Key issues included: 1) Lack of type validation for chunk indices in controller methods (allowing string-based path manipulation), 2) Missing sanitization of UUID parameters in storage methods (enabling directory traversal). The commit diff shows fixes through integer casting of indices and basename() sanitization of UUIDs, confirming these were the vulnerable points. Multiple controllers and storage implementations shared similar vulnerable patterns as shown in NVD's parameter list and the patch changes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** vuln*r**ility w*s i**nti*i** in t** w** s*rvi** *or * **unk** *il* uplo**. W*il* t** n*m*s o* t** POST p*r*m*t*rs v*ry wit* t** us** *ront*n*, t**ir v*lu*s *r* *lw*ys us** in t** s*m* w*y to *uil* * p*t* w**r* t** **unks *r* stor** *n*

Reasoning

T** vuln*r**ility st*mm** *rom improp*r **n*lin* o* us*r-*ontroll** p*r*m*t*rs in p*t* *onstru*tion. K*y issu*s in*lu***: *) L**k o* typ* v*li**tion *or **unk in*i**s in *ontroll*r m*t*o*s (*llowin* strin*-**s** p*t* m*nipul*tion), *) Missin* s*nitiz