Miggo Logo

CVE-2024-52292: Craft CMS Arbitrary System File Read

7.7

CVSS Score
3.1

Basic Information

EPSS Score
0.28462%
Published
11/13/2024
Updated
11/13/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
craftcms/cmscomposer>= 5.0.0-alpha.1, <= 5.4.7.15.4.9
craftcms/cmscomposer>= 3.5.13, <= 4.12.6.14.12.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly references the dataUrl Twig function as the exploitation vector. This function is documented in Craft CMS's developer resources and is responsible for reading file contents. The CWE-22 (Path Traversal) mapping confirms improper path limitation, and the PoC demonstrates direct abuse through absolute path input. While the exact file path is inferred based on Craft CMS's typical structure (as patch diffs aren't available), the function's role in the vulnerability chain is unambiguous from advisory details and exploit mechanics.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *y **usin* t** m*il noti*i**tion t*mpl*t* it is possi*l* to r*** *r*itr*ry op*r*tin* syst*m *il*s. ### **t*ils T** [**t*Url](*ttps://*r**t*ms.*om/*o*s/*.x/**v/*un*tions.*tml#**t*url) *un*tion **n ** *xploit** i* *n *tt**k*r **s writ* p*

Reasoning

T** vuln*r**ility *xpli*itly r***r*n**s t** **t*Url Twi* `*un*tion` *s t** *xploit*tion v**tor. T*is `*un*tion` is *o*um*nt** in *r**t *MS's **v*lop*r r*sour**s *n* is r*sponsi*l* *or r***in* *il* *ont*nts. T** *W*-** (P*t* Tr*v*rs*l) m*ppin* *on*irm