Miggo Logo

CVE-2021-21016:
Magento OS command injection via the WebAPI

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.88276%
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer< 2.3.6-p12.3.6-p1
magento/community-editioncomposer>= 2.4.0, < 2.4.22.4.2
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focused on identifying functions related to input validation, CAPTCHA, and payment processing, as these are relevant to the OS command injection vulnerability via WebAPI. The patches suggest that improvements were made to CAPTCHA validation and rate limiting, which could be related to mitigating the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M***nto v*rsions *.*.* (*n* **rli*r), *.*.*-p* (*n* **rli*r) *n* *.*.* (*n* **rli*r) *r* vuln*r**l* to OS *omm*n* inj**tion vi* t** W***PI. Su***ss*ul *xploit*tion *oul* l*** to r*mot* *o** *x**ution *y *n *ut**nti**t** *tt**k*r. ****ss to t** **min

Reasoning

T** *n*lysis *o*us** on i**nti*yin* *un*tions r*l*t** to input v*li**tion, **PT***, *n* p*ym*nt pro**ssin*, *s t**s* *r* r*l*v*nt to t** OS *omm*n* inj**tion vuln*r**ility vi* W***PI. T** p*t***s su***st t**t improv*m*nts w*r* m*** to **PT*** v*li**t