Arbitrary Code Execution Affecting magento/community-edition package, versions >=2.1.0, <2.1.18 >=2.2.0, <2.2.9 >=2.3.0, <2.3.2
Threat Intelligence
EPSS
0.24% (65th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-MAGENTOCOMMUNITYEDITION-458961
- published 12 Aug 2019
- disclosed 2 Aug 2019
- credit Simon Scannell
How to fix?
Upgrade magento/community-edition
to version 2.1.18, 2.2.9, 2.3.2 or higher.
Overview
magento/community-edition is a modern cloud eCommerce platform.
Affected versions of this package are vulnerable to Arbitrary Code Execution due to insufficient input validation in the config builder of the Elastic search module. This can be abused by an authenticated user with the ability to configure the catalog search.
References
CVSS Scores
version 3.1