Miggo Logo

CVE-2021-43836:
PHP file inclusion in the Sulu admin panel

8.6

CVSS Score

Basic Information

EPSS Score
-
Published
12/15/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
sulu/sulucomposer< 1.6.441.6.44
sulu/sulucomposer>= 2.0.0, < 2.2.182.2.18
sulu/sulucomposer>= 2.3.0, < 2.3.82.3.8
sulu/sulucomposer= 2.4.0-RC12.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the ExpressionLanguage evaluator having access to an unrestricted TranslatorInterface. The patch wraps the translator with a security proxy (TranslatorWrapper) that blocks setLocale and implicitly prevents addResource() calls. The test case explicitly shows attempts to exploit translator.addResource() were blocked post-patch. The root cause is the direct exposure of the translator to expression evaluation, which allowed path traversal via file inclusion methods in the Translator component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ *n *tt**k*r **n r*** *r*itr*ry lo**l *il*s vi* * P*P *il* in*lu**. In * ****ult *on*i*ur*tion t*is *lso l***s to r*mot* *o** *x**ution. * *ompromis** *ompon*nts: *r*itr*ry *il* r*** on

Reasoning

T** vuln*r**ility st*ms *rom t** *xpr*ssionL*n*u*** *v*lu*tor **vin* ****ss to *n unr*stri*t** Tr*nsl*torInt*r****. T** p*t** wr*ps t** tr*nsl*tor wit* * s**urity proxy (Tr*nsl*torWr*pp*r) t**t *lo*ks s*tLo**l* *n* impli*itly pr*v*nts ***R*sour**() *