Miggo Logo

CVE-2021-40616: Incorrect Authorization in thinkcmf

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.31036%
Published
6/15/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
thinkcmf/thinkcmfcomposer<= 5.1.76.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The vulnerability explicitly references AdminRbacController.php as the vulnerable file
  2. The attack vector involves modifying user ID 1's password through user management permissions
  3. CWE-863 indicates missing/incorrect authorization checks
  4. The edit action for user management would naturally be handled by a controller method like edit()
  5. The default restriction against modifying ID 1's password suggests missing conditional checks in this function
  6. High confidence comes from the direct file reference in the GitHub issue and clear authorization context mismatch

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

t*ink*m* v*.*.* **s *n un*ut*oriz** vuln*r**ility. T** *tt**k*r **n mo*i*y t** p*sswor* o* t** **ministr*tor ***ount wit* i* * t*rou** t** ***k*roun* us*r m*n***m*nt *roup p*rmissions. T** us* *on*ition is t**t t** ***k*roun* us*r m*n***m*nt *roup *u

Reasoning

*. T** vuln*r**ility *xpli*itly r***r*n**s **minR****ontroll*r.p*p *s t** vuln*r**l* *il* *. T** *tt**k v**tor involv*s mo*i*yin* us*r I* *'s p*sswor* t*rou** us*r m*n***m*nt p*rmissions *. *W*-*** in*i**t*s missin*/in*orr**t *ut*oriz*tion ****ks *.