First published: Tue Jun 25 2019(Updated: )
An Insecure Direct Object Reference (IDOR) vulnerability exists in the order processing workflow of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can lead to unauthorized access to order details.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1<2.1.18 | 2.1.18 |
Magento | >=2.1.0<2.1.18 | |
Magento | >=2.2.0<2.2.9 | |
Magento | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7890 is considered a critical vulnerability due to its potential for unauthorized access to sensitive order details in Magento.
To fix CVE-2019-7890, upgrade Magento to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7890 affects Magento 2.1 versions prior to 2.1.18, 2.2 versions prior to 2.2.9, and 2.3 versions prior to 2.3.2.
CVE-2019-7890 is classified as an Insecure Direct Object Reference (IDOR) vulnerability.
If exploited, CVE-2019-7890 can allow attackers unauthorized access to view and potentially manipulate order details.