First published: Tue Oct 08 2019(Updated: )
An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.2<2.2.10>=2.3<2.3.2-p2 | |
composer/magento/community-edition | >=2.3<2.3.2-p2 | 2.3.2-p2 |
composer/magento/community-edition | >=2.2<2.2.10 | 2.2.10 |
CentOS Libgcc | >=2.2.0<2.2.10 | |
CentOS Libgcc | >=2.2.0<2.2.10 | |
CentOS Libgcc | >=2.3.0<2.3.2 | |
CentOS Libgcc | >=2.3.0<2.3.2 | |
CentOS Libgcc | =2.3.2 | |
CentOS Libgcc | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8126 has been assigned a significant severity level due to its ability to allow XML entity injection by authenticated admin users.
To fix CVE-2019-8126, update Magento to version 2.2.10 or 2.3.3 or later.
CVE-2019-8126 affects Magento versions 2.2 prior to 2.2.10 and 2.3 prior to 2.3.3 or 2.3.2-p1.
CVE-2019-8126 is an XML entity injection vulnerability that potentially allows attackers to manipulate the XML layout.
Using affected versions of Magento without applying the security updates leaves your system vulnerable to exploitation.