Miggo Logo

CVE-2023-1975:
Answer vulnerable to Insertion of Sensitive Information Into Sent Data

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.1934%
Published
4/11/2023
Updated
4/19/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/answerdev/answergo< 1.0.81.0.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unprocessed EXIF data in user-uploaded images. The commit adds EXIF removal via a new Dexif function call within uploadFile(). In vulnerable versions (<1.0.8), this sanitization step was missing. The uploadFile function is directly responsible for processing uploads and writing files to storage, making it the vulnerable entry point. The patch confirms this by adding EXIF removal at this exact location in the file processing workflow.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*nsw*r**v/*nsw*r is *n op*n-sour** knowl****-**s** *ommunity so*tw*r*. *nsw*r prior to *.*.* *o*s not strip *XI* **olo**tion **t* *rom us*r-uplo**** lo*os. *s * r*sult, *nyon* **n **t s*nsitiv* in*orm*tion lik* * us*r's **vi** I*, **olo**tion, syst*m

Reasoning

T** vuln*r**ility st*ms *rom unpro**ss** *XI* **t* in us*r-uplo**** im***s. T** *ommit ***s *XI* r*mov*l vi* * n*w `**xi*` *un*tion **ll wit*in `uplo***il*()`. In vuln*r**l* v*rsions (<*.*.*), t*is s*nitiz*tion st*p w*s missin*. T** `uplo***il*` *un*