Miggo Logo

CVE-2021-46361: Arbitrary code execution in Magnolia CMS

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.75997%
CWE
-
Published
2/12/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
info.magnolia:magnolia-coremaven< 6.2.126.2.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers around unsafe FreeMarker template processing that allows access to Java reflection primitives. Key indicators from the exploit show:

  1. HTMLEscapingWebContextWrapper provides access to ServletContext classloader
  2. FreeMarker's ObjectWrapper enables dangerous class instantiation
  3. TemplateRenderer is the likely entry point for processing malicious templates While exact patch details aren't shown, the vendor's FreeMarker upgrade and security advisory confirm these components were addressed. Runtime detection would observe classloader access via WebContext and reflection in template processing.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* in t** *r**m*rk *ilt*r o* M**noli* *MS v*.*.** *n* **low *llows *tt**k*rs to *yp*ss s**urity r*stri*tions *n* *x**ut* *r*itr*ry *o** vi* * *r**t** *r**M*rk*r p*ylo**.

Reasoning

T** vuln*r**ility **nt*rs *roun* uns*** *r**M*rk*r t*mpl*t* pro**ssin* t**t *llows ****ss to J*v* r**l**tion primitiv*s. K*y in*i**tors *rom t** *xploit s*ow: *. *TML*s**pin*W***ont*xtWr*pp*r provi**s ****ss to S*rvl*t*ont*xt *l*sslo***r *. *r**M*rk*