Miggo Logo

CVE-2023-36097: fuadmin vulnerable to insecure file upload

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.54103%
Published
6/22/2023
Updated
11/10/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
funadmin/funadmincomposer>= 3.3.2, <= 3.3.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The vulnerability report explicitly references app/backend/controller/Addon.php#localinstall as the vulnerable location
  2. The method accepts ZIP files without validating file contents, enabling PHP file uploads
  3. Proof-of-concept demonstrates direct webshell execution via uploaded PHP files
  4. CWE-434 alignment confirms this is an unrestricted dangerous file upload scenario
  5. Issue reporter provided technical details showing direct correlation between this function and the exploit chain

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*un**min v*.*.* *n* v*.*.* *r* vuln*r**l* to ins**ur* *il* uplo** vi* t** plu*ins inst*ll.

Reasoning

*. T** vuln*r**ility r*port *xpli*itly r***r*n**s *pp/***k*n*/*ontroll*r/***on.p*p#lo**linst*ll *s t** vuln*r**l* lo**tion *. T** m*t*o* ****pts ZIP *il*s wit*out v*li**tin* *il* *ont*nts, *n**lin* P*P *il* uplo**s *. Proo*-o*-*on**pt **monstr*t*s *i