Miggo Logo

CVE-2020-7759: SQL Injection in pimcore

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.07061%
Published
5/6/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer>= 6.7.2, < 6.8.36.8.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The vulnerability is explicitly in ClassificationstoreController's data classification functionality
  2. The exploit uses the 'relationIds' parameter which is handled by the relations endpoint
  3. The GitHub PR #7315 shows the fix involved adding proper quoting for relationIds in SQL queries
  4. The vulnerability pattern matches unsafe SQL concatenation with user-controlled input
  5. Controller actions in Symfony-based Pimcore typically map directly to methods named {actionName}Action

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

"T** p**k*** pim*or*/pim*or* *rom *.*.* *n* ***or* *.*.* *r* vuln*r**l* to SQL Inj**tion in **t* *l*ssi*i**tion *un*tion*lity in *l*ssi*i**tionstor**ontroll*r. T*is **n ** *xploit** *y s*n*in* * sp**i*i**lly-*r**t** input in t** r*l*tionI*s p*r*m*t*r

Reasoning

*. T** vuln*r**ility is *xpli*itly in *l*ssi*i**tionstor**ontroll*r's **t* *l*ssi*i**tion *un*tion*lity *. T** *xploit us*s t** 'r*l*tionI*s' p*r*m*t*r w*i** is **n*l** *y t** r*l*tions *n*point *. T** *it*u* PR #**** s*ows t** *ix involv** ***in* pr