Miggo Logo

CVE-2024-39409: Magento Open Source Cross-Site Request Forgery (CSRF) vulnerability

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.33288%
Published
8/14/2024
Updated
9/16/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.4.7-p1, < 2.4.7-p22.4.7-p2
magento/community-editioncomposer= 2.4.7
magento/community-editioncomposer>= 2.4.6-p1, < 2.4.6-p72.4.6-p7
magento/community-editioncomposer= 2.4.6
magento/community-editioncomposer>= 2.4.5-p1, < 2.4.5-p92.4.5-p9
magento/community-editioncomposer= 2.4.5
magento/community-editioncomposer< 2.4.4-p102.4.4-p10
magento/community-editioncomposer= 2.4.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description indicates missing CSRF protections for minor actions. Magento's CSRF protection relies on validating form_key parameters in state-changing requests. Without commit diffs, we infer vulnerable endpoints are controller actions handling POST/PUT requests without proper CSRF token checks. The medium confidence reflects the lack of explicit patch details, but the pattern matches Magento's typical CSRF fixes where controllers omit form_key validation. The 'minor actions' description suggests non-critical endpoints (e.g., UI preferences, notifications) rather than core administrative functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M***nto Op*n Sour** v*rsions *.*.*-p*, *.*.*-p*, *.*.*-p*, *.*.*-p* *n* **rli*r *r* *****t** *y * *ross-Sit* R*qu*st *or**ry (*SR*) vuln*r**ility t**t *oul* *llow *n *tt**k*r to *yp*ss s**urity ***tur*s *n* p*r*orm minor un*ut*oris** **tions on ****l

Reasoning

T** vuln*r**ility **s*ription in*i**t*s missin* *SR* prot**tions *or minor **tions. M***nto's *SR* prot**tion r*li*s on v*li**tin* *orm_k*y p*r*m*t*rs in st*t*-***n*in* r*qu*sts. Wit*out *ommit *i**s, w* in**r vuln*r**l* *n*points *r* *ontroll*r **ti