logo

CVE-2019-7912 magento/community-edition

Package

Manager: composer
Name: magento/community-edition
Vulnerable Version: >=2.1 <2.1.18 || >=2.2 <2.2.9 || >=2.3 <2.3.2

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0033 pctl0.5536

Details

Magento Filter extension bypass via crafted store configuration keys A file upload filter bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to edit configuration keys to remove file extension filters, potentially resulting in the malicious upload and execution of malicious files on the server.

Metadata

Created: 2022-05-24T16:52:27Z
Modified: 2024-05-15T22:39:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-f8h9-7rpq-7qcc/GHSA-f8h9-7rpq-7qcc.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-f8h9-7rpq-7qcc
Finding: F027
Auto approve: 1