Miggo Logo

CVE-2021-37709: Insecure direct object reference of log files of the Import/Export feature

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.44539%
Published
8/30/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
shopware/platformcomposer<= 6.4.3.06.4.3.1
shopware/corecomposer<= 6.4.3.06.4.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from functions generating download URLs using static access tokens stored in file entities (CWE-639). The original getDownloadUrl implementations exposed: 1) sensitive access tokens in URLs (CWE-532), 2) permanent credentials allowing indefinite access, and 3) no proper authorization checks. The patch replaced these with time-limited tokens via openDownload and server-side validation. The functions were directly modified in the security fix commit, indicating their central role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Ins**ur* *ir**t o*j**t r***r*n** o* lo* *il*s o* t** Import/*xport ***tur* ### P*t***s W* r**omm*n* up**tin* to t** *urr*nt v*rsion *.*.*.*. You **n **t t** up**t* to *.*.*.* r**ul*rly vi* t** *uto-Up**t*r or *ir**tly vi* t** *ownlo** ov*

Reasoning

T** vuln*r**ility st*mm** *rom *un*tions **n*r*tin* *ownlo** URLs usin* st*ti* ****ss tok*ns stor** in *il* *ntiti*s (*W*-***). T** ori*in*l `**t*ownlo**Url` impl*m*nt*tions *xpos**: *) s*nsitiv* ****ss tok*ns in URLs (*W*-***), *) p*rm*n*nt *r***nti