First published: Tue Jun 25 2019(Updated: )
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to manipulate layouts can insert a malicious payload into the layout.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/product-community-edition | >=2.3<2.3.2 | 2.3.2 |
composer/magento/product-community-edition | >=2.2<2.2.9 | 2.2.9 |
composer/magento/product-community-edition | >=2.1<2.1.18 | 2.1.18 |
composer/magento/community-edition | >=2.3<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1<2.1.18 | 2.1.18 |
Magento | >=2.1.0<2.1.18 | |
Magento | >=2.2.0<2.2.9 | |
Magento | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7876 is rated as critical due to the potential for remote code execution by authenticated users with specific privileges.
To fix CVE-2019-7876, upgrade your Magento installation to versions 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7876 affects Magento versions prior to 2.1.18, 2.2.9, and 2.3.2, particularly installations where users have layout manipulation privileges.
The risks associated with CVE-2019-7876 include unauthorized remote access and execution of arbitrary code on vulnerable Magento systems.
A common exploit scenario for CVE-2019-7876 involves an authenticated user injecting malicious code into the layout due to inadequate input validation.