First published: Tue Jun 25 2019(Updated: )
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create or edit a product can execute arbitrary code via malicious XML layout updates.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7942 has been classified as a critical severity vulnerability due to its potential for remote code execution.
To fix CVE-2019-7942, upgrade Magento to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7942 is a remote code execution vulnerability that affects Magento installations.
CVE-2019-7942 affects authenticated users with admin privileges in Magento versions prior to 2.1.18, 2.2.9, and 2.3.2.
An attacker exploiting CVE-2019-7942 can execute arbitrary code on the server through malicious XML layout updates.