Miggo Logo

CVE-2022-23793: Path Traversal within joomla/archive tar class

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.03186%
Published
3/31/2022
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
joomla/archivecomposer< 1.1.121.1.12
joomla/archivecomposer>= 2.0.0, < 2.0.12.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path sanitization during tar extraction. The Tar::extract method is responsible for handling archive entries, and the advisory explicitly mentions the tar extractor as the vulnerable component. Path traversal occurs when processing malicious filenames without normalization checks, a common failure pattern in CWE-22 scenarios. The high confidence comes from the direct match between the vulnerability description and the core responsibility of the extract method in tar handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in Jooml*! *.*.* t*rou** *.**.* & *.*.* t*rou** *.*.*. *xtr**tin* *n sp**i*il*y *r**t** t*r p**k*** *oul* writ* *il*s outsi** o* t** int*n*** p*t*.

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* s*nitiz*tion *urin* t*r *xtr**tion. T** `T*r::*xtr**t` m*t*o* is r*sponsi*l* *or **n*lin* *r**iv* *ntri*s, *n* t** **visory *xpli*itly m*ntions t** t*r *xtr**tor *s t** vuln*r**l* *ompon*nt. P*t* tr*v*rs*l o