Miggo Logo

CVE-2024-32871:
Flooding Server with Thumbnail files

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.00991%
Published
6/4/2024
Updated
6/4/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/pimcorecomposer>= 11.0.0, < 11.2.411.2.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from three key issues: 1) Missing format validation in thumbnail generation methods, 2) Unrestricted scaling factors, and 3) Duplicate file creation logic. The commit diffs show critical validations (checkAllowedFormats/checkMaxScalingFactor) were added to the generate methods in multiple thumbnail handlers. The ImageThumbnailTrait's format check was case-sensitive and lacked allowlist enforcement prior to patching. These functions directly control format handling and scaling operations, making them the root cause of server flooding and resource exhaustion vulnerabilities.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# **t*ils ## *. *ll Im**i*k support** *il**orm*ts *r* s*rv** wit*out *ilt*rin* T** T*um*n*il *n*point *o*s not ****k ***inst *ny *ilt*rs w**t *il* *orm*ts s*oul* ** s*rv**. W* **n tr*ns*o** t** im*** in *ll *orm*ts im***m**i*k supports. Wit* t**t w*

Reasoning

T** vuln*r**ility st*ms *rom t*r** k*y issu*s: *) Missin* *orm*t v*li**tion in t*um*n*il **n*r*tion m*t*o*s, *) Unr*stri*t** s**lin* ***tors, *n* *) *upli**t* *il* *r**tion lo*i*. T** *ommit *i**s s*ow *riti**l v*li**tions (`****k*llow***orm*ts`/`***