First published: Tue Jun 25 2019(Updated: )
A remote code execution vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create sitemaps can execute arbitrary PHP code by creating a malicious sitemap file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/magento1ee | >=1<1.14.4.2 | |
composer/magento/magento1ce | >=1<1.9.4.2 | |
composer/magento/community-edition | >=2.3<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1<2.1.18 | 2.1.18 |
CentOS Libgcc | <1.9.4.2 | |
CentOS Libgcc | <1.14.4.2 | |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7932 allows an authenticated user with admin privileges to execute arbitrary PHP code on affected Magento systems.
CVE-2019-7932 affects Magento Open Source versions prior to 1.9.4.2 and Magento Commerce versions before 1.14.4.2, along with specific versions of Magento 2.1, 2.2, and 2.3.
To fix CVE-2019-7932, update Magento to the patched versions: Magento Open Source 1.9.4.2 or later, 2.1.18 or later, 2.2.9 or later, or 2.3.2 or later.
CVE-2019-7932 is classified as a remote code execution vulnerability.
No, an attacker needs to have admin privileges to exploit CVE-2019-7932.