First published: Tue Jun 25 2019(Updated: )
A stored cross-site scripting vulnerability exists in the product comments field of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to the Return Product comments field can inject malicious javascript.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/magento1ee | >=1<1.14.4.2 | |
composer/magento/magento1ce | >=1<1.9.4.2 | |
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
Magento | <1.9.4.2 | |
Magento | <1.14.4.2 | |
Magento | >=2.1.0<2.1.18 | |
Magento | >=2.2.0<2.2.9 | |
Magento | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7944 is categorized as a stored cross-site scripting vulnerability.
To mitigate CVE-2019-7944, update your Magento instance to versions 1.9.4.2, 1.14.4.2, 2.1.18, 2.2.9, or 2.3.2.
Magento Open Source versions prior to 1.9.4.2, Magento Commerce prior to 1.14.4.2, and Magento 2.1 versions prior to 2.1.18 and so on are affected.
An authenticated user with privileges to the Return Product feature can exploit CVE-2019-7944.
CVE-2019-7944 allows attackers to execute malicious scripts on users' browsers, potentially leading to data theft or session hijacking.