Miggo Logo

CVE-2021-32717: Exposure of Sensitive Information to an Unauthorized Actor

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.60463%
Published
9/8/2021
Updated
1/29/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
shopware/platformcomposer<= 6.4.1.06.4.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from incorrect visibility configuration handling in cloud storage integration. The commit diff shows the fix involved modifying FilesystemFactory.php to properly read visibility from 'config.options.visibility' instead of a fallback. Prior to 6.4.1.1, this misconfiguration allowed private files to be stored with public access permissions if the hashed URL was known. The factory method is directly responsible for configuring the filesystem adapter's visibility settings, making it the root cause of the insecure default behavior.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

S*opw*r* is *n op*n sour** **omm*r** pl*t*orm. In v*rsions prior to *.*.*.* priv*t* *il*s pu*li*ly ****ssi*l* wit* *lou* Stor*** provi**rs w**n t** **s*** URL is known. Us*rs *r* r**omm*n* to *irst ***n** t**ir *on*i*ur*tion to s*t t** *orr**t visi*i

Reasoning

T** vuln*r**ility st*ms *rom in*orr**t visi*ility *on*i*ur*tion **n*lin* in *lou* stor*** int**r*tion. T** *ommit *i** s*ows t** *ix involv** mo*i*yin* `*il*syst*m***tory.p*p` to prop*rly r*** visi*ility *rom '*on*i*.options.visi*ility' inst*** o* *