Miggo Logo

CVE-2021-21029:
Magento Reflected Cross-site Scripting vulnerability via 'file' parameter

4.8

CVSS Score
3.1

Basic Information

EPSS Score
0.97363%
Published
5/24/2022
Updated
1/20/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer< 2.3.6-p12.3.6-p1
magento/community-editioncomposer>= 2.4.0, < 2.4.22.4.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patch modifies the getNameUnsanitizedHtml function to use escaper.escapeHtml, indicating that the original function was vulnerable to XSS. This function is used to render product names, and the patch ensures that user-input data is properly sanitized.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M***nto v*rsions *.*.* (*n* **rli*r), *.*.*-p* (*n* **rli*r) *n* *.*.* (*n* **rli*r) *r* *****t** *y * R**l**t** *ross-sit* S*riptin* vuln*r**ility vi* '*il*' p*r*m*t*r. Su***ss*ul *xploit*tion *oul* l*** to *r*itr*ry J*v*S*ript *x**ution in t** vi*t

Reasoning

T** p*t** mo*i*i*s t** `**tN*m*Uns*nitiz***tml` *un*tion to us* `*s**p*r.*s**p**tml`, in*i**tin* t**t t** ori*in*l *un*tion w*s vuln*r**l* to XSS. T*is *un*tion is us** to r*n**r pro*u*t n*m*s, *n* t** p*t** *nsur*s t**t us*r-input **t* is prop*rly s