First published: Tue Jun 25 2019(Updated: )
An information leakage vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges may be able to view metadata of a trusted device used by another administrator via a crafted http request.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7929 is rated as a moderate severity vulnerability.
To resolve CVE-2019-7929, upgrade to Magento version 2.1.18, 2.2.9, or 2.3.2.
CVE-2019-7929 affects authenticated users with administrator privileges on Magento 2.1, 2.2, and 2.3 versions prior to the specified security updates.
CVE-2019-7929 is an information leakage vulnerability.
No, CVE-2019-7929 requires authenticated access to be exploited.