logo

CVE-2019-8230 magento/core

Package

Manager: composer
Name: magento/core
Vulnerable Version: >=0 <1.9.4.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00188 pctl0.40905

Details

Magento Remote code execution through support/output path modification In Magento Open Source prior to 1.9.4.3, and Magento Commerce prior to 1.14.4.3, an authenticated user with administrative privileges to edit configuration settings can execute arbitrary code through a crafted support/output path.

Metadata

Created: 2022-05-24T17:00:29Z
Modified: 2024-01-10T21:36:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qp43-2vhf-cj8g/GHSA-qp43-2vhf-cj8g.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-qp43-2vhf-cj8g
Finding: F422
Auto approve: 1