Miggo Logo

CVE-2022-0274:
Cross-site Scripting OrchardCore.Application.Cms.Targets

6.8

CVSS Score
3.0

Basic Information

EPSS Score
0.36409%
Published
1/21/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
OrchardCore.Application.Cms.Targetsnuget< 1.2.21.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability patterns show missing input sanitization and improper HTML encoding across multiple components handling user-controllable data:

  1. Link field/menu item drivers lacked URL validation checks and HTML sanitization of constructed anchor tags
  2. Error message handling directly interpolated untrusted data into localized strings without encoding
  3. Workflow helpers used raw strings in localization contexts that bypass HTML encoding
  4. The patches consistently add HTML sanitization checks, URL validation, and proper encoded string handling via HtmlEncoder and IHtmlSanitizerService injections
  5. CWE-79 alignment confirms these are classic XSS vectors in web content generation paths

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* S*riptin* (XSS) - Stor** in Nu**t Or***r**or*.*ppli**tion.*ms.T*r**ts prior to *.*.*.

Reasoning

T** vuln*r**ility p*tt*rns s*ow missin* input s*nitiz*tion *n* improp*r *TML *n*o*in* **ross multipl* *ompon*nts **n*lin* us*r-*ontroll**l* **t*: *. Link *i*l*/m*nu it*m *riv*rs l**k** URL v*li**tion ****ks *n* *TML s*nitiz*tion o* *onstru*t** *n**or