Miggo Logo

CVE-2021-21032:
Magento Insufficient Session Expiration

5.6

CVSS Score
3.1

Basic Information

EPSS Score
0.3767%
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.4.0, < 2.4.1-p12.4.1-p1
magento/community-editioncomposer< 2.3.62.3.6
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on insufficient session invalidation. Magento's session termination mechanisms during logout/password changes are prime suspects. The Session::logout() method and its caller in the Logout controller are critical points where improper session handling (e.g., missing session regeneration or cookie invalidation) could leave sessions active. While exact patch details are unavailable, these components align with CWE-613 patterns and Magento's session management architecture.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M***nto v*rsions *.*.* (*n* **rli*r), *.*.*-p* (*n* **rli*r) *n* *.*.* (*n* **rli*r) *o not ***qu*t*ly inv*li**t* us*r s*ssions. Su***ss*ul *xploit*tion o* t*is issu* *oul* l*** to un*ut*oriz** ****ss to r*stri*t** r*sour**s. ****ss to t** **min *ons

Reasoning

T** vuln*r**ility **nt*rs on insu**i*i*nt s*ssion inv*li**tion. M***nto's s*ssion t*rmin*tion m****nisms *urin* lo*out/p*sswor* ***n**s *r* prim* susp**ts. T** `S*ssion::lo*out()` m*t*o* *n* its **ll*r in t** Lo*out *ontroll*r *r* *riti**l points w**