logo

CVE-2023-26366 magento/community-edition

Package

Manager: composer
Name: magento/community-edition
Vulnerable Version: =2.4.7-beta1 || >=2.4.7-beta1 <2.4.7-beta2 || =2.4.7 || =2.4.6 || =2.4.5 || =2.4.4 || >=2.4.6-p1 <2.4.6-p3 || >=2.4.5-p1 <2.4.5-p5 || >=2.4.4-p1 <2.4.4-p6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U

EPSS: 0.00324 pctl0.5482

Details

Magento Open Source allows Server-Side Request Forgery (SSRF) Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A high-privileged authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction, scope is changed due to the fact that an attacker can enforce file read outside the application's path boundary.

Metadata

Created: 2023-10-13T09:30:22Z
Modified: 2025-03-04T18:20:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-8jxc-5f94-22vh/GHSA-8jxc-5f94-22vh.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-8jxc-5f94-22vh
Finding: F100
Auto approve: 1