First published: Tue Jun 25 2019(Updated: )
Insufficient server-side validation of user input could allow an attacker to bypass file upload restrictions in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7861 has a medium severity rating due to its potential for unauthorized file uploads.
To address CVE-2019-7861, upgrade your Magento installation to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7861 affects Magento 2.1 versions before 2.1.18, 2.2 before 2.2.9, and 2.3 before 2.3.2.
CVE-2019-7861 allows attackers to bypass file upload restrictions due to insufficient server-side validation.
CVE-2019-7861 is not classified as critical, but it poses a significant risk if not patched.