Miggo Logo

CVE-2022-2016: Cross-site Scripting in FacturaScripts

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.5013%
Published
6/10/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
facturascripts/facturascriptscomposer<= 2022.08

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper input sanitization sequence in the Balance model's validation logic. The test() method originally validated the codbalance field with a regex check before applying HTML escaping, creating an XSS vector through validation error messages. The patch fixed this by moving the noHtml() sanitization to occur before validation. The unit tests added in the commit specifically verify HTML escaping behavior, confirming the pre-patch vulnerability in field handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* S*riptin* (XSS) - R**l**t** in *it*u* r*pository n*or*zorx/***tur*s*ripts. * p*t** is *v*il**l* on t** `m*st*r` *r*n** o* t** r*pository in *ommit ********.

Reasoning

T** vuln*r**ility st*mm** *rom improp*r input s*nitiz*tion s*qu*n** in t** **l*n** mo**l's v*li**tion lo*i*. T** t*st() m*t*o* ori*in*lly v*li**t** t** *o***l*n** *i*l* wit* * r***x ****k ***or* *pplyin* *TML *s**pin*, *r**tin* *n XSS v**tor t*rou**