First published: Tue Jun 25 2019(Updated: )
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges to access shipment settings can execute arbitrary code via server-side request forgery.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7892 is considered a critical remote code execution vulnerability affecting affected versions of Magento.
To fix CVE-2019-7892, upgrade Magento to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7892 affects authenticated users with administrator privileges in Magento 2.1, 2.2, and 2.3 prior to their patched versions.
CVE-2019-7892 is a server-side request forgery vulnerability that allows execution of arbitrary code.
No, CVE-2019-7892 requires an authenticated user with administrative access to exploit the vulnerability.