OS Command Injection Affecting akeneo/pim-community-dev package, versions >=1.4, <1.4.28 >=1.5, <1.5.15 >=1.6, <1.6.6


Severity

Recommended
0.0
critical
0
10

    Threat Intelligence

    EPSS
    6.62% (94th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-AKENEOPIMCOMMUNITYDEV-6674060
  • published 26 Apr 2024
  • disclosed 13 May 2022
  • credit Unknown

How to fix?

Upgrade akeneo/pim-community-dev to version 1.4.28, 1.5.15, 1.6.6 or higher.

Overview

akeneo/pim-community-dev is an Akeneo PIM, a catalog management tool.

Affected versions of this package are vulnerable to OS Command Injection due to improper handling of user input in the mass edition feature. An attacker can execute arbitrary code on the server by injecting malicious commands.

References

CVSS Scores

version 3.1
Expand this section

Snyk

9.8 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

9.8 critical