SQL Injection Affecting magento/community-edition package, versions >=2.1, <2.1.17 >=2.2, <2.2.8 >=2.3, <2.3.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-MAGENTOCOMMUNITYEDITION-174046
  • published 1 Apr 2019
  • disclosed 26 Mar 2018
  • credit Pete O'Callaghan

Introduced: 26 Mar 2018

CVE NOT AVAILABLE CWE-94 Open this link in a new tab

How to fix?

Upgrade magento/community-edition to version 2.1.17, 2.2.8, 2.3.1 or higher.

Overview

magento/community-edition is a modern cloud eCommerce platform.

Affected versions of this package are vulnerable to SQL Injection. An authenticated user can insert embedded malicious code through an SQL injection vulnerability in the Catalog section by manipulating attribute_code.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.8 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High