First published: Tue Jun 25 2019(Updated: )
A security bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 that could be abused to execute arbitrary PHP code. An authenticated user can bypass security protections that prevent arbitrary PHP script upload via form data injection.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7871 is classified as a high severity vulnerability due to its potential to allow authenticated users to execute arbitrary PHP code.
To resolve CVE-2019-7871, upgrade Magento to version 2.1.18, 2.2.9, or 2.3.2, depending on your current version.
CVE-2019-7871 affects Magento versions 2.1 to 2.1.17, 2.2 to 2.2.8, and 2.3 to 2.3.1.
CVE-2019-7871 allows an authenticated attacker to bypass security measures and upload arbitrary PHP scripts via form data injection.
The vulnerability CVE-2019-7871 impacts Magento systems running affected versions of the product-community-edition.