Miggo Logo

CVE-2022-25769:
Improper regex in htaccess file

9.1

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
3/1/2022
Updated
1/11/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
mautic/corecomposer< 3.3.53.3.5
mautic/corecomposer>= 4.0.0, < 4.2.04.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from an improper regex pattern in the .htaccess file, which is an Apache configuration file rather than application code. Runtime profilers track executed functions in application code, but the vulnerability exists at the server configuration level where allowed PHP files are determined by path matching. There are no PHP functions in Mautic's codebase that directly handle this regex logic or process input related to this misconfiguration. The exploit would trigger execution of unauthorized PHP files (potentially attacker-controlled), but those files' functions would not be part of Mautic's codebase and thus cannot be identified from the provided patches or advisory details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t t** ****ult .*t****ss *il* **s som* r*stri*tions in t** ****ss to P*P *il*s to only *llow sp**i*i* P*P *il*s to ** *x**ut** in t** root o* t** *ppli**tion. T*is lo*i* isn't *orr**t, *s t** r***x in t** s**on* *il*sM*t** only ****ks t** *i

Reasoning

T** vuln*r**ility st*ms *rom *n improp*r r***x p*tt*rn in t** .*t****ss *il*, w*i** is *n *p**** *on*i*ur*tion *il* r*t**r t**n *ppli**tion *o**. Runtim* pro*il*rs tr**k *x**ut** *un*tions in *ppli**tion *o**, *ut t** vuln*r**ility *xists *t t** s*rv