First published: Tue Oct 08 2019(Updated: )
A stored cross-site scripting (XSS) vulnerability exists in in Magento 1 prior to 1.9.4.3 and 1.14.4.3, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with access to the wysiwyg editor can abuse the `blockDirective()` function and inject malicious javascript in the cache of the admin dashboard. As per [the Magento Release 2.3.3](https://web.archive.org/web/20201126132230/https://devdocs.magento.com/guides/v2.3/release-notes/release-notes-2-3-3-commerce.html#new-security-only-patch-available), if you have already implemented the pre-release version of this patch (2.3.2-p1), it is highly recommended to promptly upgrade to 2.3.2-p2.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.2<2.2.10>=2.3<2.3.2-p2 | |
composer/magento/magento1ce | >=1<1.9.4.3 | |
composer/magento/magento1ee | >=1<1.14.4.3 | |
Magento Magento | >=1.5.0.0<1.9.4.3 | |
Magento Magento | >=1.9.0.0<1.14.4.3 | |
Magento Magento | >=2.2.0<2.2.10 | |
Magento Magento | >=2.2.0<2.2.10 | |
Magento Magento | >=2.3.0<2.3.2 | |
Magento Magento | >=2.3.0<2.3.2 | |
Magento Magento | =2.3.2 | |
Magento Magento | =2.3.2 | |
composer/magento/community-edition | >=2.3<2.3.2-p2 | 2.3.2-p2 |
composer/magento/community-edition | >=2.2.0<2.2.10 | 2.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.