Miggo Logo

CVE-2022-32115: Known vulnerable to code execution via SVG file in v1.3.1

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.71145%
Published
7/9/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
idno/knowncomposer<= 1.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper SVG validation in isSVG(). The function's original implementation (pre-patch) only checked for '.svg' file extensions rather than validating actual content. The researcher blog shows attackers could upload SVG files containing <script> tags or PHP code. The GitHub commit adds isFileFreeFromScriptTags() to address this, confirming the lack of content validation in the original isSVG() implementation. CWE-79 classification and CVE description both point to improper input neutralization in web content generation via SVG processing.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* in t** isSV*() *un*tion o* Known v*.*.* *llows *tt**k*rs to *x**ut* *r*itr*ry *o** vi* * *r**t** SV* *il*. T** r*s**r***r r*port in*i**t*s t**t v*rsions *.*.* *n* prior *r* vuln*r**l*. V*rsion *.*.* is t** l*st v*rsion t***** on *it*u* *n*

Reasoning

T** vuln*r**ility st*ms *rom improp*r SV* `v*li**tion` in `isSV*()`. T** *un*tion's ori*in*l impl*m*nt*tion (pr*-p*t**) only ****k** *or '.sv*' *il* *xt*nsions r*t**r t**n v*li**tin* **tu*l *ont*nt. T** r*s**r***r *lo* s*ows *tt**k*rs *oul* uplo** SV