Miggo Logo

CVE-2021-30134: php-mod/curl allows Cross-site Scripting

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.9328%
Published
12/26/2022
Updated
4/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
php-mod/curlcomposer< 2.3.22.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two test endpoints that reflect user input without proper Content-Type headers. In post_file_path_upload.php, JSON output lacked application/json headers, allowing XSS via JSON/HTML confusion. In post_multidimensional.php, raw POST data was echoed back without text/plain headers, enabling direct script execution. The commit fixed these by adding proper headers, confirming the XSS vector was browser response type misinterpretation combined with unescaped output.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

p*p-mo*/*url (* wr*pp*r o* t** P*P *URL *xt*nsion) ***or* *.*.* *llows XSS vi* t** `post_*il*_p*t*_uplo**.p*p` k*y p*r*m*t*r *n* t** POST **t* to `post_multi*im*nsion*l.p*p`.

Reasoning

T** vuln*r**ility st*ms *rom two t*st *n*points t**t r**l**t us*r input wit*out prop*r *ont*nt-Typ* *****rs. In post_*il*_p*t*_uplo**.p*p, JSON output l**k** *ppli**tion/json *****rs, *llowin* XSS vi* JSON/*TML *on*usion. In post_multi*im*nsion*l.p*p