First published: Tue Jun 25 2019(Updated: )
A path traversal vulnerability in the WYSIWYG editor for Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could result in unauthorized access to uploaded images due to insufficient access control.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
Magento | >=2.1.0<2.1.18 | |
Magento | >=2.2.0<2.2.9 | |
Magento | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7859 is classified as a high-severity path traversal vulnerability affecting certain versions of Magento.
To fix CVE-2019-7859, you should update Magento to version 2.1.18, 2.2.9, or 2.3.2 to mitigate the vulnerability.
CVE-2019-7859 affects Magento versions 2.1 before 2.1.18, 2.2 before 2.2.9, and 2.3 before 2.3.2.
CVE-2019-7859 is a path traversal vulnerability that can lead to unauthorized access to uploaded images.
If you cannot update Magento, it is recommended to implement additional access controls to restrict image access until you can upgrade.