Miggo Logo

CVE-2022-25276: Lack of domain validation in Druple core

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.78372%
Published
4/26/2023
Updated
11/12/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
drupal/corecomposer>= 8.0.0, < 9.3.199.3.19
drupal/corecomposer>= 9.4.0, < 9.4.39.4.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly mentions improper domain validation in the Media oEmbed iframe route. The OEmbedController::renderIframe method is the primary handler for oEmbed iframe rendering in Drupal's Media module. Before the patched versions, this controller did not implement proper domain validation checks when generating iframe content, allowing arbitrary domains to be embedded. This matches the CWE-79 (XSS) pattern of improper input validation during content generation. The confidence is high as this is the canonical oEmbed iframe handler and the vulnerability directly relates to its domain validation logic.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** M**i* o*m*** i*r*m* rout* *o*s not prop*rly v*li**t* t** i*r*m* *om*in s*ttin*, w*i** *llows *m***s to ** *ispl*y** in t** *ont*xt o* t** prim*ry *om*in. Un**r **rt*in *ir*umst*n**s, t*is *oul* l*** to *ross-sit* s*riptin*, l**k** *ooki*s, or ot*

Reasoning

T** vuln*r**ility **s*ription *xpli*itly m*ntions improp*r *om*in v*li**tion in t** M**i* o*m*** i*r*m* rout*. T** `O*m****ontroll*r::r*n**rI*r*m*` m*t*o* is t** prim*ry **n*l*r *or o*m*** i*r*m* r*n**rin* in *rup*l's M**i* mo*ul*. ***or* t** p*t****