Miggo Logo

CVE-2020-9580:
Magento Security mitigation bypass vulnerability

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.47781%
CWE
-
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer<= 2.2.11
magento/community-editioncomposer>= 2.3.0, < 2.3.4-p22.3.4-p2
magento/corecomposer< 1.9.4.51.9.4.5
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focused on identifying functions that were either directly vulnerable or were modified as part of the security patch to mitigate the vulnerability. The patches provided indicate changes across various Magento modules, with a focus on customer session handling, input validation, and security-related functions. The identified functions are directly related to the changes made in the patches and are considered critical for runtime detection of the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M***nto v*rsions *.*.* *n* **rli*r, *.*.** *n* **rli*r (s** not*), *.**.*.* *n* **rli*r, *n* *.*.*.* *n* **rli*r **v* * s**urity miti**tion *yp*ss vuln*r**ility. Su***ss*ul *xploit*tion *oul* l*** to *r*itr*ry *o** *x**ution.

Reasoning

T** *n*lysis *o*us** on i**nti*yin* *un*tions t**t w*r* *it**r *ir**tly vuln*r**l* or w*r* mo*i*i** *s p*rt o* t** s**urity p*t** to miti**t* t** vuln*r**ility. T** p*t***s provi*** in*i**t* ***n**s **ross v*rious M***nto mo*ul*s, wit* * *o*us on *us