Miggo Logo

CVE-2022-0930: Cross-site Scripting in microweber

4.8

CVSS Score
3.1

Basic Information

EPSS Score
0.63653%
Published
3/13/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
microweber/microwebercomposer< 1.2.121.2.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from using a blacklist (is_dangerous_file) instead of a whitelist approach. The patch replaced this with is_allowed_file which uses a strict allowlist. The original is_dangerous_file in Files.php was insufficient as it only blocked known dangerous extensions, leaving gaps for executable content in allowed formats. This allowed attackers to bypass upload restrictions and store XSS payloads through files like malicious SVGs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*il* uplo** *ilt*r *yp*ss l***in* to stor** XSS in *it*u* r*pository mi*row***r/mi*row***r prior to *.*.**.

Reasoning

T** vuln*r**ility st*mm** *rom usin* * *l**klist (is_**n**rous_*il*) inst*** o* * w*it*list *ppro***. T** p*t** r*pl**** t*is wit* is_*llow**_*il* w*i** us*s * stri*t *llowlist. T** ori*in*l is_**n**rous_*il* in *il*s.p*p w*s insu**i*i*nt *s it only