Miggo Logo

CVE-2022-0724: Insecure Storage of Sensitive Information in Microweber

N/A

CVSS Score

Basic Information

EPSS Score
0.6194%
Published
2/24/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
microweber/microwebercomposer< 1.31.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure handling of uploaded images where EXIF data was not stripped. The patch in commit b592c86 modifies the image processing logic in plupload.php to explicitly re-save images using GD library functions (imagejpeg/imagepng/imagegif), which creates new images without EXIF data. The presence of these functions in the code without proper execution or implementation in versions <1.3 indicates the vulnerability. The diff shows the same GD functions were present but lacked the critical EXIF-stripping behavior before the patch, likely due to missing logic paths or improper configuration.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Mi*row***r prior to v*rsion *.* *o*s not strip im***s o* *XI* **t*, *xposin* in*orm*tion **out us*rs' lo**tions, **vi** **r*w*r*, *n* **vi** so*tw*r*.

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* **n*lin* o* uplo**** im***s w**r* *XI* **t* w*s not stripp**. T** p*t** in *ommit ******* mo*i*i*s t** im*** pro**ssin* lo*i* in pluplo**.p*p to *xpli*itly r*-s*v* im***s usin* ** li*r*ry *un*tions (im***jp**/im*