Miggo Logo

CVE-2022-4863: usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.2489%
Published
12/30/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/usememos/memosgo< 0.9.10.9.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing authorization checks after resource retrieval in multiple handlers. The patch added explicit creator ID verification post-fetch (e.g., checking memo.CreatorID != userID) where previously authorization was only enforced through query parameters. This pattern was present in memo, resource, and shortcut handlers. The JSON struct tag additions (json:"-") in API models prevent malicious parameter injection, but the core vulnerability was in the server-side handlers' authorization flow.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Improp*r **n*lin* o* Insu**i*i*nt P*rmissions or Privil***s in *it*u* r*pository us*m*mos/m*mos prior to *.*.*.

Reasoning

T** vuln*r**ility st*mm** *rom missin* *ut*oriz*tion ****ks **t*r r*sour** r*tri*v*l in multipl* **n*l*rs. T** p*t** ***** *xpli*it *r**tor I* v*ri*i**tion post-**t** (*.*., ****kin* `m*mo.*r**torI*` != `us*rI*`) w**r* pr*viously *ut*oriz*tion w*s on