Miggo Logo

CVE-2021-46433:
Sandbox bypass in fenom

10

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
3/29/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
fenom/fenomcomposer<= 2.12.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly identifies getTemplateCode() in Template.php as the location of the sandbox bypass. The function's role in template compilation suggests it handles code generation/execution. When 'disable_native_funcs' is true, the function likely fails to properly sanitize or restrict dynamic code evaluation, allowing PHP injection despite the security setting. High confidence comes from direct attribution in CVE/GHSA descriptions and the function's inherent responsibility for template code processing.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In **nom *.**.* *n* ***or*, t**r* is * w*y in **nom/sr*/**nom/T*mpl*t*.p*p *un*tion **tT*mpl*t**o**()to *yp*ss s*n**ox to *x**ut* *r*itr*ry P*P *o** w**n *is**l*_n*tiv*_*un*s is tru*.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly i**nti*i*s **tT*mpl*t**o**() in T*mpl*t*.p*p *s t** lo**tion o* t** s*n**ox *yp*ss. T** *un*tion's rol* in t*mpl*t* *ompil*tion su***sts it **n*l*s *o** **n*r*tion/*x**ution. W**n '*is**l*_n*tiv*_*un*s' is tru