Miggo Logo

CVE-2022-31140: Valinor error messages leading to potential data exfiltration before v0.12.0

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.33459%
Published
7/12/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
cuyz/valinorcomposer< 0.12.00.12.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises because Valinor's error handling system included exception messages from userland code (e.g., Money::fromString) in error outputs by default. The Message::body() method directly exposes these messages via Throwable::getMessage(), which could contain sensitive data. The fix in 0.12.0 introduced explicit filtering via MapperBuilder::filterExceptions(), confirming that the root cause was unvalidated exposure of exception messages through this method.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

```p*p <?p*p n*m*sp*** My\*pp; us* *uyZ\V*linor\M*pp*r\M*ppin**rror; us* *uyZ\V*linor\M*pp*r\Tr**\No**; us* *uyZ\V*linor\M*pp*r\Tr**\No**Tr*v*rs*r; us* *uyZ\V*linor\M*pp*r*uil**r; r*quir*_on** __*IR__ . '/V*linor/v*n*or/*utolo**.p*p'; *in*l *l*ss

Reasoning

T** vuln*r**ility *ris*s ****us* V*linor's *rror **n*lin* syst*m in*lu*** *x**ption m*ss***s *rom us*rl*n* *o** (*.*., `Mon*y::*romStrin*`) in *rror outputs *y ****ult. T** `M*ss***::*o*y()` m*t*o* *ir**tly *xpos*s t**s* m*ss***s vi* `T*row**l*::**tM