Miggo Logo

CVE-2024-11956: pimcore/customer-data-framework vulnerable to SQL Injection

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.00095%
Published
1/28/2025
Updated
1/28/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/customer-management-framework-bundlecomposer< 4.2.14.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in SQL query construction through user-controlled 'filter' and 'filterDefinition' parameters. The error message shows raw user input ('@_0') in JOIN clauses, indicating unsafe string interpolation. The patch (commit #549) explicitly mentions 'Use parameters for joins', confirming that pre-4.2.1 versions concatenated user input into SQL. The Controller endpoint handles these parameters, while CustomerSegmentManager and SqlService are logical locations for query building with segments/filters. High confidence comes from the direct correlation between the exploit's SQL error patterns and the patched parameterization approach.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n SQL inj**tion vuln*r**ility *llows *ny *ut**nti**t** us*r to *x**ut* *r*itr*ry SQL *omm*n*s on t** s*rv*r. T*is **n l*** to un*ut*oriz** ****ss to s*nsitiv* **t*, **t* mo*i*i**tion, or *v*n *ompl*t* *ontrol ov*r t** s*rv*r. **t*ils T** vuln*r**il

Reasoning

T** vuln*r**ility m*ni**sts in SQL qu*ry *onstru*tion t*rou** us*r-*ontroll** '*ilt*r' *n* '*ilt*r***inition' p*r*m*t*rs. T** *rror m*ss*** s*ows r*w us*r input ('@_*') in JOIN *l*us*s, in*i**tin* uns*** strin* int*rpol*tion. T** p*t** (*ommit #***)