Miggo Logo

CVE-2022-25337:
Code injection in ezsystems/ezpublish-kernel

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
2/19/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ezsystems/ezpublish-kernelcomposer>= 7.5.0, < 7.5.267.5.26

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability descriptions and references do not include specific code snippets, commit diffs, or explicit function names. The advisory focuses on high-level behavior (filename sanitization and lack of access control) rather than implementation details. While the vulnerability stems from insufficient sanitization in filename handling and insecure path generation, the exact functions responsible (e.g., filename sanitization routines, image storage path resolvers) cannot be identified with high confidence without access to the pre-patch codebase or explicit documentation of the affected components. The lack of GitHub patch/commit details further limits precise identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W**n im*** *il*s *r* uplo****, t**y *r* m*** ****ssi*l* un**r * n*m* simil*r to t** ori*in*l *il* n*m*. T**r* *r* two issu*s wit* t*is. *ot* r*quir* ****ss to uplo**in* im***s in or**r to *xploit t**m, t*is limits t** imp**t. T** *irst issu* is t**t

Reasoning

T** provi*** vuln*r**ility **s*riptions *n* r***r*n**s *o not in*lu** sp**i*i* *o** snipp*ts, *ommit *i**s, or *xpli*it *un*tion n*m*s. T** **visory *o*us*s on *i**-l*v*l ****vior (*il*n*m* s*nitiz*tion *n* l**k o* ****ss *ontrol) r*t**r t**n impl*m*