Miggo Logo

CVE-2022-0083: User enumeration in livehelperchat

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.43675%
Published
1/21/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
remdex/livehelperchatcomposer< 3.913.91

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from different system responses during password reset attempts. The key modification was in forgotpassword.php where the else clause originally performed a redirect (for non-existent users) versus rendering a template (for existing users). This created an observable difference in behavior (HTTP 302 vs 200) that attackers could exploit to determine valid user emails. The template message in forgotpasswordsent.tpl.php was also made more generic to avoid revealing existence status, but the primary vulnerable logic was in the controller's flow control.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

liv***lp*r***t is vuln*r**l* to **n*r*tion o* *rror M*ss*** *ont*inin* S*nsitiv* In*orm*tion. T**r* is *n o*s*rv**l* *is*r*p*n*y **tw**n *rrors **n*r*t** *or us*rs t**t *xist *n* t*os* t**t *o not.

Reasoning

T** vuln*r**ility st*mm** *rom *i***r*nt syst*m r*spons*s *urin* p*sswor* r*s*t *tt*mpts. T** k*y mo*i*i**tion w*s in `*or*otp*sswor*.p*p` w**r* t** *ls* *l*us* ori*in*lly p*r*orm** * r**ir**t (*or non-*xist*nt us*rs) v*rsus r*n**rin* * t*mpl*t* (*or