logo

CVE-2024-39406 magento/community-edition

Package

Manager: composer
Name: magento/community-edition
Vulnerable Version: >=2.4.7-p1 <2.4.7-p2 || =2.4.7 || >=2.4.6-p1 <2.4.6-p7 || =2.4.6 || >=2.4.5-p1 <2.4.5-p9 || =2.4.5 || >=0 <2.4.4-p10 || =2.4.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

EPSS: 0.00537 pctl0.66562

Details

Magento Open Source Path Traversal vulnerability Magento Open Source versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed.

Metadata

Created: 2024-08-14T12:35:02Z
Modified: 2024-09-16T18:26:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-6pxh-2557-5cj5/GHSA-6pxh-2557-5cj5.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-6pxh-2557-5cj5
Finding: F063
Auto approve: 1