Miggo Logo

CVE-2024-52600: Statamic CMS has a Path Traversal in Asset Upload

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.33703%
Published
11/19/2024
Updated
11/19/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
statamic/cmscomposer<= 5.16.05.17.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient path sanitization in asset handling components. Key evidence includes:

  1. The patch adds path traversal checks in Asset.php's path() setter (commit 400875b)
  2. AssetFolder.php's path() method was modified to throw on traversal patterns (commit 4cc2c9b)
  3. Tests demonstrate exploitation via URL-encoded '../' sequences (commit 0c07c10)
  4. FolderActionController required exception handling for path traversal detection These functions directly process user-controlled path inputs and were missing validation prior to patching, making them the attack surface for directory traversal.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ss*ts uplo**** wit* *ppropri*t*ly *r**t** *il*n*m*s m*y r*sult in t**m **in* pl**** in * lo**tion *i***r*nt t**n w**t w*s *on*i*ur**. ### Imp**t - *****ts *ront-*n* *orms wit* `*ss*ts` *i*l*s. - *****ts ot**r pl***s w**r* *ss*ts **n ** uplo****, *

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt p*t* s*nitiz*tion in *ss*t **n*lin* *ompon*nts. K*y *vi**n** in*lu**s: *. T** p*t** ***s p*t* tr*v*rs*l ****ks in *ss*t.p*p's p*t*() s*tt*r (*ommit *******) *. *ss*t*ol**r.p*p's p*t*() m*t*o* w*s mo*i*i** to