Miggo Logo

CVE-2022-39314:
Kirby CMS vulnerable to user enumeration in the code-based login and password reset forms

4.8

CVSS Score
3.0

Basic Information

EPSS Score
0.26098%
Published
10/18/2022
Updated
1/30/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
getkirby/cmscomposer>= 3.5.0, < 3.5.8.23.5.8.2
getkirby/cmscomposer>= 3.6.0, < 3.6.6.23.6.6.2
getkirby/cmscomposer>= 3.7.0, < 3.7.5.13.7.5.1
getkirby/cmscomposer= 3.8.03.8.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two main points: 1) Error leakage in challenge creation flow, and 2) Unhandled exceptions in login failure hooks. The patch notes specifically mention error handling improvements in auth challenge creation and hook processing. These functions are core components of Kirby's authentication system and align with the described vulnerability patterns. The Challenge::create method would be responsible for email-based challenges, while Auth::handleLoginFailed would trigger the problematic hook. The high confidence comes from the direct mapping between described vulnerability patterns and core authentication system components mentioned in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### TL;*R T*is vuln*r**ility only *****ts you i* you *r* usin* t** `*o**` or `p*sswor*-r*s*t` *ut* m*t*o* wit* t** `*ut*.m*t*o*s` option. It **n only ** su***ss*ully *xploit** un**r s*rv*r *on*i*ur*tion *on*itions outsi** o* t** *tt**k*r's *ontrol.

Reasoning

T** vuln*r**ility st*ms *rom two m*in points: *) *rror l**k*** in ***ll*n** *r**tion *low, *n* *) Un**n*l** *x**ptions in lo*in **ilur* *ooks. T** p*t** not*s sp**i*i**lly m*ntion *rror **n*lin* improv*m*nts in *ut* ***ll*n** *r**tion *n* *ook pro**s