First published: Tue Jun 25 2019(Updated: )
A server-side request forgery (SSRF) vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to the admin panel to manipulate system configuration and execute arbitrary code.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/magento1ee | >=1<1.14.4.2 | |
composer/magento/magento1ce | >=1<1.9.4.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7911 has a high severity rating due to its potential for enabling server-side request forgery attacks.
To mitigate CVE-2019-7911, upgrade to Magento Open Source versions 1.9.4.2 or later, Magento Commerce 1.14.4.2 or later, Magento 2.1.18 or later, 2.2.9 or later, or 2.3.2 or later.
Authenticated users with access to the admin panel of affected versions of Magento are vulnerable to CVE-2019-7911.
CVE-2019-7911 impacts Magento Open Source and Magento Commerce versions prior to the specified patched versions.
Yes, CVE-2019-7911 can be exploited through crafted requests by authenticated users with administrative access.