Miggo Logo

CVE-2021-26642:
XpressEngine vulnerable to Unrestricted Upload of File with Dangerous Type

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.85736%
Published
1/20/2023
Updated
2/8/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
xpressengine/xpressenginecomposer< 3.0.153.0.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient file extension validation during uploads. The GitHub issue #1366 explicitly mentions adding .phar extension filtering, indicating the file upload handler previously lacked proper extension checks. The FileHandler::handleUpload (or similar) would be responsible for processing uploads and validating file types. Without proper extension filtering in this function, attackers could upload malicious files. The high confidence comes from the direct correlation between the patch's purpose (adding extension filtering) and the typical file upload handler implementation patterns in PHP frameworks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W**n uplo**in* *n im*** *il* to * *ull*tin *o*r* **v*lop** wit* Xpr*ss*n*in*, * vuln*r**ility in w*i** *n *r*itr*ry *il* **n ** uplo**** *u* to insu**i*i*nt v*ri*i**tion o* t** *il*. * r*mot* *tt**k*r **n us* t*is vuln*r**ility to *x**ut* *r*itr*ry *

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt *il* *xt*nsion v*li**tion *urin* uplo**s. T** *it*u* issu* #**** *xpli*itly m*ntions ***in* `.p**r` *xt*nsion *ilt*rin*, in*i**tin* t** *il* uplo** **n*l*r pr*viously l**k** prop*r *xt*nsion ****ks. T** `*il*