Miggo Logo

GHSA-3c5g-73f7-grvm: Neos Information Disclosure Security Note

7.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
5/17/2024
Updated
5/17/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
neos/neoscomposer>= 2.3.0, < 3.0.203.0.20
neos/neoscomposer>= 3.1.0, < 3.1.183.1.18
neos/neoscomposer>= 3.2.0, < 3.2.143.2.14
neos/neoscomposer>= 3.3.0, < 3.3.233.3.23
neos/neoscomposer>= 4.0.0, < 4.0.174.0.17
neos/neoscomposer>= 4.1.0, < 4.1.164.1.16
neos/neoscomposer>= 4.2.0, < 4.2.124.2.12
neos/neoscomposer>= 4.3.0, < 4.3.34.3.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unauthenticated access to internal workspaces via URL manipulation. The NodeController.showAction is the primary entry point for frontend rendering and would handle workspace context resolution. The ContextFactory.create method is critical for workspace initialization. Together they form the chain that likely lacks proper authorization checks for internal workspaces. Confidence is high for NodeController as it's directly tied to URL handling, and medium for ContextFactory as the exact vulnerability trigger depends on implementation details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u* to r*ports it **s ***n v*li**t** t**t int*rn*l worksp***s in N*os *r* ****ssi*l* wit*out *ut**nti**tion. Som* us*rs *ssum** t*is is * pl*nn** ***tur* *ut it is not. * worksp*** pr*vi*w s*oul* ** *n ***ition*l ***tur* wit* r*sp**tiv* s**urity m**s

Reasoning

T** vuln*r**ility st*ms *rom un*ut**nti**t** ****ss to int*rn*l worksp***s vi* URL m*nipul*tion. T** `No***ontroll*r.s*ow**tion` is t** prim*ry *ntry point *or *ront*n* r*n**rin* *n* woul* **n*l* worksp*** *ont*xt r*solution. T** `*ont*xt***tory.*r**