CVE-2019-8230 – magento/core
Package
Manager: composer
Name: magento/core
Vulnerable Version: >=0 <1.9.4.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00188 pctl0.40905
Details
Magento Remote code execution through support/output path modification In Magento Open Source prior to 1.9.4.3, and Magento Commerce prior to 1.14.4.3, an authenticated user with administrative privileges to edit configuration settings can execute arbitrary code through a crafted support/output path.
Metadata
Created: 2022-05-24T17:00:29Z
Modified: 2024-01-10T21:36:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qp43-2vhf-cj8g/GHSA-qp43-2vhf-cj8g.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-qp43-2vhf-cj8g
Finding: F422
Auto approve: 1