Miggo Logo

CVE-2021-26599: SQL Injection in ImpressCMS

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.92345%
Published
3/29/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
impresscms/impresscmscomposer< 1.4.31.4.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of the 'groups' parameter in findusers.php. Both getUserCountByGroupLink and getUsersByGroupLink methods in the member handler class directly incorporate unsanitized user input into SQL queries. Multiple independent reports (Karmainsecurity, HackerOne) confirm these methods construct queries using $_POST['groups'] without parameterization or escaping. The patch in v1.4.3 specifically mentions 'improvements in findusers logic and filtering', aligning with these functions being the attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Impr*ss*MS ***or* *.*.* *llows in*lu**/*in*us*rs.p*p *roups SQL Inj**tion.

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* t** '*roups' p*r*m*t*r in `*in*us*rs.p*p`. *ot* `**tUs*r*ount*y*roupLink` *n* `**tUs*rs*y*roupLink` m*t*o*s in t** m*m**r **n*l*r *l*ss *ir**tly in*orpor*t* uns*nitiz** us*r input into SQL qu*ri*s. Mu