CVE-2023-40033:
Flarum vulnerable to LFI and Blind SSRF via Avatar upload
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37251%
CWE
Published
8/16/2023
Updated
11/9/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
flarum/core | composer | < 1.8.0 | 1.8.0 |
flarum/framework | composer | < 1.8.0 | 1.8.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the intervention/image package interpreting file streams as URLs. The pre-patch code passed $file->getStream()
to imageManager->make()
, which reads raw content. If the uploaded file contained a URL string (with spoofed MIME), the library would fetch it, enabling SSRF/LFI. The patch replaced getStream()
with getStream()->getMetadata('uri')
, forcing the library to treat the input as a local file path instead of raw content, mitigating URL interpretation. The modified functions in the commit diff directly correlate to avatar/file
upload handlers, making them the entry points for exploitation.