CVE-2019-7912 – magento/community-edition
Package
Manager: composer
Name: magento/community-edition
Vulnerable Version: >=2.1 <2.1.18 || >=2.2 <2.2.9 || >=2.3 <2.3.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0033 pctl0.5536
Details
Magento Filter extension bypass via crafted store configuration keys A file upload filter bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to edit configuration keys to remove file extension filters, potentially resulting in the malicious upload and execution of malicious files on the server.
Metadata
Created: 2022-05-24T16:52:27Z
Modified: 2024-05-15T22:39:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-f8h9-7rpq-7qcc/GHSA-f8h9-7rpq-7qcc.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-f8h9-7rpq-7qcc
Finding: F027
Auto approve: 1