Miggo Logo

CVE-2023-51450: baserCMS OS command injection vulnerability in Installer

5.6

CVSS Score
3.1

Basic Information

EPSS Score
0.61415%
Published
2/22/2024
Updated
2/22/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
baserproject/basercmscomposer< 5.0.95.0.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patch adds 'escape' => true to the figcaption element in BcAdminFormHelper's control method. This indicates user input rendered in form controls (likely used during installation) was not properly escaped. Since the vulnerability manifests in the Installer feature, unescaped form values could flow into OS command execution contexts. The direct correlation between the patch location and the CWE-78 vulnerability type confirms this was the injection vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T**r* is * OS *omm*n* inj**tion in Inst*ll*r ***tur* to **s*r*MS. ### T*r**t **s*r*MS *.*.* *n* **rli*r v*rsions ### Vuln*r**ility M*li*ious *omm*n* m*y ** *x**ut** in Inst*ll*r. ### *ount*rm**sur*s Up**t* to t** l*t*st v*rsion o* **s*r*MS Pl**s*

Reasoning

T** p*t** ***s '*s**p*' => tru* to t** *i***ption *l*m*nt in `****min*orm**lp*r`'s *ontrol m*t*o*. T*is in*i**t*s us*r input r*n**r** in *orm *ontrols (lik*ly us** *urin* inst*ll*tion) w*s not prop*rly *s**p**. Sin** t** vuln*r**ility m*ni**sts in t*