CVE-2019-8126 – magento/community-edition
Package
Manager: composer
Name: magento/community-edition
Vulnerable Version: >=2.2 <2.2.10 || >=2.3 <2.3.2-p2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00108 pctl0.29693
Details
Information disclosure through processing of external XML entities An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure. As per [the Magento Release 2.3.3](https://web.archive.org/web/20201126132230/https://devdocs.magento.com/guides/v2.3/release-notes/release-notes-2-3-3-commerce.html#new-security-only-patch-available), if you have already implemented the pre-release version of this patch (2.3.2-p1), it is highly recommended to promptly upgrade to 2.3.2-p2.
Metadata
Created: 2019-11-12T22:59:24Z
Modified: 2024-02-12T11:49:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-427g-2r83-3ccm/GHSA-427g-2r83-3ccm.json
CWE IDs: ["CWE-611", "CWE-776"]
Alternative ID: GHSA-427g-2r83-3ccm
Finding: F083
Auto approve: 1