Miggo Logo

CVE-2021-41231: DataFlow upload remote code execution vulnerability

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.42365%
Published
1/27/2023
Updated
2/7/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
openmage/magento-ltscomposer< 19.4.2219.4.22
openmage/magento-ltscomposer>= 20.0.0, < 20.0.1920.0.19

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient filename validation in file handling functions. The commit diff shows security checks were added to addImage() and write() to block null bytes and path traversal. These functions directly process user-controlled filenames during DataFlow uploads, making them the entry points for exploitation. The CWE-77 (Command Injection) and CWE-434 (Unrestricted File Upload) align with the lack of sanitization in these functions, confirming their role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n **ministr*tor wit* t** p*rmissions to uplo** *il*s vi* **t**low *n* to *r**t* pro*u*ts w*s **l* to *x**ut* *r*itr*ry *o** vi* t** *onv*rt pro*il*.

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt `*il*n*m*` v*li**tion in *il* **n*lin* `*un*tions`. T** *ommit *i** s*ows s**urity ****ks w*r* ***** to `***Im***()` *n* `writ*()` to *lo*k null *yt*s *n* p*t* tr*v*rs*l. T**s* `*un*tions` *ir**tly `pro**ss`