Miggo Logo

CVE-2022-0638: Cross-Site Request Forgery microweber

4.3

CVSS Score
3.0

Basic Information

EPSS Score
0.27185%
Published
2/18/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
microweber/microwebercomposer< 1.2.111.2.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the logout action not enforcing CSRF protections. The pre-patch code used a direct logout() call, which likely bypassed Laravel's built-in CSRF validation middleware. The patch replaced this with Auth::logout() and added proper redirect handling, aligning with Laravel's secure authentication practices. Since the commit directly modifies this method to address the CSRF flaw, we can confidently attribute the vulnerability to the original implementation of the submit method.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

mi*row***r prior to v*rsion *.*.** is vuln*r**l* to *ross-Sit* R*qu*st *or**ry (*SR*).

Reasoning

T** vuln*r**ility st*ms *rom t** lo*out **tion not *n*or*in* *SR* prot**tions. T** pr*-p*t** *o** us** * *ir**t `lo*out()` **ll, w*i** lik*ly *yp*ss** L*r*v*l's *uilt-in *SR* v*li**tion mi**l*w*r*. T** p*t** r*pl**** t*is wit* `*ut*::lo*out()` *n* **