First published: Tue Jun 25 2019(Updated: )
A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to manipulate shipment methods to execute arbitrary code.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
Magento | >=2.1.0<2.1.18 | |
Magento | >=2.2.0<2.2.9 | |
Magento | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7913 is a critical vulnerability classified as a server-side request forgery (SSRF) that allows an authenticated user with admin privileges to potentially execute arbitrary code.
To fix CVE-2019-7913, you need to update your Magento installation to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7913 affects Magento versions prior to 2.1.18, 2.2.9, and 2.3.2.
CVE-2019-7913 is characterized as a server-side request forgery (SSRF) vulnerability.
No, CVE-2019-7913 requires an authenticated user with admin privileges for exploitation.