CVE-2019-7911 – magento/community-edition
Package
Manager: composer
Name: magento/community-edition
Vulnerable Version: >=2.1.0 <2.1.18 || >=2.2.0 <2.2.9 || >=2.3.0 <2.3.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00329 pctl0.55266
Details
Magento 2 Community Edition Server-Side Request Forgery vulnerability A server-side request forgery (SSRF) vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to the admin panel to manipulate system configuration and execute arbitrary code.
Metadata
Created: 2022-05-24T16:52:27Z
Modified: 2024-02-12T11:17:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-33cj-w75f-49m2/GHSA-33cj-w75f-49m2.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-33cj-w75f-49m2
Finding: F100
Auto approve: 1