Miggo Logo

CVE-2022-0266: Authorization Bypass Through User-Controlled Key in LiveHelperChat

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.53167%
Published
1/21/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
remdex/livehelperchatcomposer< 3.923.92

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patches indicate that the original code was vulnerable to deleting admin users and specific groups without proper authorization checks. The functions identified are directly related to the processing of user-controlled input (user_id and group_id) and were modified to add checks to prevent exploitation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ut*oriz*tion *yp*ss T*rou** Us*r-*ontroll** K*y in P**k**ist r*m**x/liv***lp*r***t prior to *.**v.

Reasoning

T** p*t***s in*i**t* t**t t** ori*in*l *o** w*s vuln*r**l* to **l*tin* **min us*rs *n* sp**i*i* *roups wit*out prop*r *ut*oriz*tion ****ks. T** *un*tions i**nti*i** *r* *ir**tly r*l*t** to t** pro**ssin* o* us*r-*ontroll** input (us*r_i* *n* *roup_i*