Miggo Logo

GHSA-f6p5-76fp-m248: URL Rewrite vulnerability in multiple zendframework components

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
4/28/2022
Updated
1/7/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
zendframework/zend-diactoroscomposer< 1.8.41.8.4
zendframework/zend-feedcomposer< 2.10.32.10.3
zendframework/zend-httpcomposer< 2.8.12.8.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability pattern across all components involves URI determination logic that trusted specific HTTP headers (X-Rewrite-Url, X-Original-Url) without verifying the server environment actually uses those rewrite mechanisms. The primary vulnerable functions are those responsible for marshaling request URIs in each component:

  1. In zend-diactoros: ServerRequestFactory's URI creation method trusted rewrite headers
  2. In zend-http: PhpEnvironment\Request's URI detection used vulnerable headers
  3. In zend-feed: PubSubHubbub's Subscriber used headers to verify callback URLs

These functions would appear in runtime profiles when processing malicious requests containing spoofed rewrite headers, as they directly handle header-based URI resolution before the security patches added server environment validation checks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

z*n*-*i**toros (*n*, *y *xt*nsion, *xpr*ssiv*), z*n*-*ttp (*n*, *y *xt*nsion, Z*n* *r*m*work MV* proj**ts), *n* z*n*-**** (sp**i*i**lly, its Pu*Su**u**u* su*-*ompon*nt) **** *ont*in * pot*nti*l URL r*writ* *xploit. In **** **s*, m*rs**lin* * r*qu*st

Reasoning

T** vuln*r**ility p*tt*rn **ross *ll *ompon*nts involv*s URI **t*rmin*tion lo*i* t**t trust** sp**i*i* *TTP *****rs (X-R*writ*-Url, X-Ori*in*l-Url) wit*out v*ri*yin* t** s*rv*r *nvironm*nt **tu*lly us*s t*os* r*writ* m****nisms. T** prim*ry vuln*r**l