CVE-2021-41231: DataFlow upload remote code execution vulnerability
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42365%
CWE
Published
1/27/2023
Updated
2/7/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| openmage/magento-lts | composer | < 19.4.22 | 19.4.22 |
| openmage/magento-lts | composer | >= 20.0.0, < 20.0.19 | 20.0.19 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient filename validation in file handling functions. The commit diff shows security checks were added to addImage() and write() to block null bytes and path traversal. These functions directly process user-controlled filenames during DataFlow uploads, making them the entry points for exploitation. The CWE-77 (Command Injection) and CWE-434 (Unrestricted File Upload) align with the lack of sanitization in these functions, confirming their role in the vulnerability.