First published: Tue Jun 25 2019(Updated: )
A defense-in-depth check was added to mitigate inadequate session validation handling by 3rd party checkout modules. This impacts Magento 1.x prior to 1.9.4.2, Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9 and Magento 2.3 prior to 2.3.2.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/magento1ee | >=1<1.14.4.2 | |
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/magento1ce | >=1<1.9.4.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | <1.14.4.2 | |
CentOS Libgcc | >=1.0.0<1.9.4.2 | |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7849 has been rated as a medium severity vulnerability.
To fix CVE-2019-7849, upgrade to Magento 1.9.4.2 or later, Magento Commerce 1.14.4.2 or later, Magento 2.1.18, Magento 2.2.9, or Magento 2.3.2.
CVE-2019-7849 affects Magento 1.x versions prior to 1.9.4.2 and Magento 2.x versions prior to 2.1.18, 2.2.9, and 2.3.2.
CVE-2019-7849 is specific to Magento and can be common among users of outdated versions.
CVE-2019-7849 is related to inadequate session validation handling in third-party checkout modules.