Miggo Logo

CVE-2022-38080: exceedone/exment and exceedone/laravel-admin Cross-site Scripting vulnerability

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.58014%
Published
8/25/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
exceedone/exmentcomposer>= 5.0.0, < 5.0.35.0.3
exceedone/exmentcomposer< 4.4.34.4.3
exceedone/laravel-admincomposer< 2.2.32.2.3
exceedone/laravel-admincomposer= 3.0.03.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

Reflected XSS typically involves echoing unvalidated request parameters in responses. Both packages' authentication flows are prime candidates as they handle redirect parameters and error messages. The vulnerability requires authenticated access, aligning with login/redirect functionality. While no direct code is available, Laravel-admin's known use of {!! !!} raw output directives in Blade templates for redirect URLs (common in auth flows) and Exment's extension of these components suggests these entry points. Confidence is medium due to pattern-matching rather than direct code analysis.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

R**l**t** *ross-sit* s*riptin* vuln*r**ility in *xm*nt ((P*P*) *x****on*/*xm*nt v*.*.* *n* **rli*r *n* *x****on*/l*r*v*l-**min v*.*.* *n* **rli*r, (P*P*) *x****on*/*xm*nt v*.*.* *n* **rli*r *n* *x****on*/l*r*v*l-**min v*.*.* *n* **rli*r) *llows * r*m

Reasoning

R**l**t** XSS typi**lly involv*s ***oin* unv*li**t** r*qu*st p*r*m*t*rs in r*spons*s. *ot* p**k***s' *ut**nti**tion *lows *r* prim* **n*i**t*s *s t**y **n*l* r**ir**t p*r*m*t*rs *n* *rror m*ss***s. T** vuln*r**ility r*quir*s *ut**nti**t** ****ss, *li