logo

CVE-2015-6497 magento/core

Package

Manager: composer
Name: magento/core
Vulnerable Version: >=0 <1.9.2.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.02921 pctl0.85871

Details

Magento arbitrary PHP code execution via the productData parameter The create function in `app/code/core/Mage/Catalog/Model/Product/Api/V2.php` in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to `index.php/api/v2_soap`.

Metadata

Created: 2022-05-24T17:06:13Z
Modified: 2024-01-10T23:10:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-j4fq-3fm7-wh5v/GHSA-j4fq-3fm7-wh5v.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-j4fq-3fm7-wh5v
Finding: F184
Auto approve: 1