First published: Tue Nov 05 2019(Updated: )
## Withdrawn Advisory This advisory has been withdrawn because the vulnerability does not affect a package in one of the GitHub Advisory Database's [supported ecosystems](https://github.com/github/advisory-database/blob/main/README.md#supported-ecosystems). This link is maintained to preserve external references. ## Original Description In Magento prior to 1.9.4.3 and Magento prior to 1.14.4.3, an authenticated user with limited administrative privileges can inject arbitrary JavaScript code into transactional email page when creating a new email template or editing existing email template.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | <1.9.4.3 | 1.9.4.3 |
CentOS Libgcc | >=1.5.0.0<1.9.4.3 | |
CentOS Libgcc | >=1.9.0.0<1.14.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8228 has been withdrawn and does not indicate any severity as it was determined not to affect supported ecosystems.
Since CVE-2019-8228 has been withdrawn, no specific fix is required.
CVE-2019-8228 was related to Magento versions below 1.9.4.3 and 1.14.4.3.
CVE-2019-8228 is not relevant as it has been withdrawn and does not affect packages in supported ecosystems.
CVE-2019-8228 was withdrawn because the vulnerability was found not to affect any supported packages.