Miggo Logo

CVE-2021-41938: Arbitrary file upload in ShopXO

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.57359%
Published
5/20/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
shopxo/shopxocomposer<= 2.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in 3 distinct admin controllers handling file uploads via ZIP archives. Each corresponds to URLs mentioned in the exploit: 1) Theme.php's upload handler only filters lowercase '.php' extensions, 2) Pluginsadmin.php's upload lacks validation in admin subdirectories, and 3) Appmini.php's themeupload accepts ZIPs with no validation. The confidence is high as the GitHub issue explicitly maps these endpoints to vulnerable functionality through demonstrated attack vectors.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in S*opXO *MS *.*.*. **t*r *nt*rin* t** m*n***m*nt p***, t**r* is *n *r*itr*ry *il* uplo** vuln*r**ility in t*r** lo**tions.

Reasoning

T** vuln*r**ility m*ni**sts in * *istin*t **min *ontroll*rs **n*lin* *il* uplo**s vi* ZIP *r**iv*s. **** *orr*spon*s to URLs m*ntion** in t** *xploit: *) `T**m*.p*p`'s uplo** **n*l*r only *ilt*rs low*r**s* '.p*p' *xt*nsions, *) `Plu*ins**min.p*p`'s u