Miggo Logo

CVE-2022-2111: Unrestricted Attachment Upload

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.63114%
Published
6/17/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
inventreepip< 0.7.20.7.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability combines two aspects: 1) Unrestricted file upload (CWE-434) allowing dangerous types, and 2) Improper handling of downloaded files leading to execution. The commit shows frontend JavaScript changes (sanitizeData) and admin resource modifications, but the critical fix would involve changing how attachments are served. The high-confidence entry reflects frontend link generation without download enforcement, while the medium-confidence entry addresses missing server-side headers. Without exact commit diffs, these are inferred from the described vulnerability pattern and solution strategy.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Inv*nTr** *llows unr*stri*t** uplo** o* *il*s *s *tt***m*nts to v*rious **t***s* *i*l*s. Pot*nti*lly **n**rous *il*s (su** *s *TML *il*s *ont*inin* m*li*ious j*v*s*ript) **n ** uplo****, *n* (w**n op*n** *y t** us*r) run t** m*li*ious *o*

Reasoning

T** vuln*r**ility *om*in*s two *sp**ts: *) Unr*stri*t** *il* uplo** (*W*-***) *llowin* **n**rous typ*s, *n* *) Improp*r **n*lin* o* *ownlo**** *il*s l***in* to *x**ution. T** *ommit s*ows *ront*n* J*v*S*ript ***n**s (`s*nitiz***t*`) *n* **min r*sour*