Miggo Logo

CVE-2022-31047: Insertion of Sensitive Information into Log File in typo3/cms-core

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.64361%
Published
6/17/2022
Updated
7/24/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cms-corecomposer>= 7.0.0, < 7.6.577.6.57
typo3/cms-corecomposer>= 8.0.0, < 8.7.478.7.47
typo3/cms-corecomposer>= 9.0.0, < 9.5.359.5.35
typo3/cms-corecomposer>= 10.0.0, < 10.4.2910.4.29
typo3/cms-corecomposer>= 11.0.0, < 11.5.1111.5.11
typo3/cmscomposer>= 10.0.0, < 10.4.2910.4.29
typo3/cmscomposer>= 11.0.0, < 11.5.1111.5.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the writeLogEntries method in AbstractExceptionHandler.php, which handled exception logging. The pre-patch version unconditionally added the exception object (including stack traces) to log contexts. The commit c93ea69 introduced a $logExceptionStackTrace flag to control this behavior, indicating this was the vulnerable point. The CWE-532 (log insertion of sensitive info) directly maps to this function's pre-patch behavior of logging raw exception data containing credentials.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

> ### M*t* > * *VSS: `*VSS:*.*/*V:N/**:*/PR:L/UI:N/S:U/*:*/I:N/*:N/*:*/RL:O/R*:*` (*.*) ### Pro*l*m It **s ***n *is*ov*r** t**t syst*m int*rn*l *r***nti*ls or k*ys (*.*. **t***s* *r***nti*ls) **v* ***n lo**** *s pl*int*xt in *x**ption **n*l*rs, w**n

Reasoning

T** vuln*r**ility st*ms *rom t** `writ*Lo**ntri*s` m*t*o* in `**str**t*x**ption**n*l*r.p*p`, w*i** **n*l** *x**ption lo**in*. T** pr*-p*t** v*rsion un*on*ition*lly ***** t** *x**ption o*j**t (in*lu*in* st**k tr***s) to lo* *ont*xts. T** *ommit ******