Miggo Logo

CVE-2023-50462: Insecure Direct Object Reference in extension "Content Consent" (content_consent)

5.3

CVSS Score
3.1

Basic Information

EPSS Score
-
CWE
-
Published
12/13/2023
Updated
12/13/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
t3s/content-consentcomposer>= 2.0.0, < 2.0.22.0.2
t3s/content-consentcomposer< 1.0.31.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing authorization checks when processing content element display requests. In TYPO3 MVC architecture:

  1. Controller actions handle parameter input and initiate rendering
  2. Repository methods perform database lookups

While no patch diffs are available, the advisory explicitly states the lack of permission verification for content element identifiers. This indicates:

  • The controller action handling content display (likely showAction) accepted user input without authorization
  • The repository method retrieving elements (findByUid) was called with this untrusted input

These functions would appear in runtime profiles when processing malicious requests as they directly handle the vulnerable parameter flow. Confidence is medium due to inference from advisory text rather than explicit patch analysis.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *xt*nsion **ils to v*ri*y w**t**r * sp**i*i** *ont*nt *l*m*nt i**nti*i*r is p*rmitt** *y t** plu*in. T*is *n**l*s *n un*ut**nti**t** us*r to *ispl*y v*rious *ont*nt *l*m*nts, l***in* to *n ins**ur* *ir**t o*j**t r***r*n** (I*OR) vuln*r**ility wit

Reasoning

T** vuln*r**ility st*ms *rom missin* *ut*oriz*tion ****ks w**n pro**ssin* *ont*nt *l*m*nt *ispl*y r*qu*sts. In TYPO* MV* *r**it**tur*: *. *ontroll*r **tions **n*l* p*r*m*t*r input *n* initi*t* r*n**rin* *. R*pository m*t*o*s p*r*orm **t***s* lookups