Miggo Logo

CVE-2023-37267:
Umbraco allows possible Admin-level access to backoffice without Auth under rare conditions

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.53941%
Published
7/13/2023
Updated
11/4/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Umbraco.Cms.Infrastructurenuget>= 9.0.0, < 10.6.110.6.1
Umbraco.Cms.Infrastructurenuget>= 11.0.0, < 11.4.211.4.2
Umbraco.Cms.Infrastructurenuget= 12.0.012.0.1
Umbraco.Cms.Web.BackOfficenuget>= 9.0.0, < 10.6.110.6.1
Umbraco.Cms.Web.BackOfficenuget>= 11.0.0, < 11.4.211.4.2
Umbraco.Cms.Web.BackOfficenuget= 12.0.012.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key behaviors: 1) The CompleteInstall method's auto-login feature after restart when in Install mode, which bypassed authentication. 2) The runtime state transitioning to Install mode when detecting database issues, enabling the attack surface. The commit diff shows removal of IBackOfficeSignInManager dependencies and auto-login logic in CompleteInstall, plus hardening of runtime state transitions in DetermineRuntimeLevel. These changes directly address the authentication bypass and improper state management described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Un**r r*r* *on*itions, * r*st*rt o* Um*r**o **n *llow un*ut*oriz** us*rs to **in **min-l*v*l p*rmissions. ### Imp**t *n un*ut*oriz** us*r **inin* **min-l*v*l ****ss *n* p*rmissions to t** ***ko**i**. ### P*t***s **.*.*, **.*.*, **.*.* ### Work*rou

Reasoning

T** vuln*r**ility st*ms *rom two k*y ****viors: *) T** `*ompl*t*Inst*ll` m*t*o*'s *uto-lo*in ***tur* **t*r r*st*rt w**n in Inst*ll mo**, w*i** *yp*ss** *ut**nti**tion. *) T** runtim* st*t* tr*nsitionin* to Inst*ll mo** w**n **t**tin* **t***s* issu*s,