Miggo Logo

CVE-2021-32671: XSS vulnerability with translator

10

CVSS Score
3.1

Basic Information

EPSS Score
0.8657%
Published
6/7/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
flarum/corecomposer>= 1.0.0, <= 1.0.11.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows the vulnerability stemmed from unescaped string parameters in the translation system. The patched version introduces a loop that wraps string parameters in React elements (<>...</>), which forces proper HTML escaping. The prepareParameters method before v1.0.2 would pass raw user input strings directly to the translation renderer, enabling XSS when these strings contained HTML markup.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*l*rum's tr*nsl*tion syst*m *llow** *or strin* inputs to ** *onv*rt** into *TML *OM no**s w**n r*n**r**. T*is ***n** w*s m*** **t*r v*.*.*-**t*.** (our l*st **t* ***or* v*.*.*) *n* w*s not noti*** or *o*um*nt**. T*is *llow** *or *ny us*r to typ* m*l

Reasoning

T** *ommit *i** s*ows t** vuln*r**ility st*mm** *rom un*s**p** strin* p*r*m*t*rs in t** tr*nsl*tion syst*m. T** p*t**** v*rsion intro*u**s * loop t**t wr*ps strin* p*r*m*t*rs in R***t *l*m*nts (<>...</>), w*i** *or**s prop*r *TML *s**pin*. T** `pr*p*