Miggo Logo

CVE-2023-32065: OroCommerce get-totals-for-checkout API endpoint returns unwanted data

5.8

CVSS Score
3.1

Basic Information

EPSS Score
0.41068%
Published
11/27/2023
Updated
11/28/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
oro/commercecomposer>= 4.2.0, <= 4.2.10
oro/commercecomposer>= 5.0.0, < 5.0.115.0.11
oro/commercecomposer>= 5.1.0, < 5.1.15.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper access control (CWE-284) in an API endpoint. The pattern suggests a missing authorization check in the controller action responsible for handling checkout totals requests. The endpoint name 'get-totals-for-checkout' maps to a standard Symfony controller action naming convention (getTotalsForCheckoutAction). The vulnerability allows data exposure through Checkout ID enumeration, indicating the handler didn't verify user permissions before returning sensitive checkout totals data. The confidence is high as this pattern matches the described vulnerability and typical Symfony architecture, though without direct code access we rely on standard implementation patterns.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**t*il** ****kout tot*ls in*orm*tion m*y ** r***iv** *y ****kout I*

Reasoning

T** vuln*r**ility st*ms *rom improp*r ****ss *ontrol (*W*-***) in *n *PI *n*point. T** p*tt*rn su***sts * missin* *ut*oriz*tion ****k in t** *ontroll*r **tion r*sponsi*l* *or **n*lin* ****kout tot*ls r*qu*sts. T** *n*point n*m* '**t-tot*ls-*or-****ko