CVE-2015-6497 – magento/core
Package
Manager: composer
Name: magento/core
Vulnerable Version: >=0 <1.9.2.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.02921 pctl0.85871
Details
Magento arbitrary PHP code execution via the productData parameter The create function in `app/code/core/Mage/Catalog/Model/Product/Api/V2.php` in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to `index.php/api/v2_soap`.
Metadata
Created: 2022-05-24T17:06:13Z
Modified: 2024-01-10T23:10:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-j4fq-3fm7-wh5v/GHSA-j4fq-3fm7-wh5v.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-j4fq-3fm7-wh5v
Finding: F184
Auto approve: 1