First published: Tue Nov 05 2019(Updated: )
## Withdrawn Advisory This advisory has been withdrawn because the vulnerability does not affect a package in one of the GitHub Advisory Database's [supported ecosystems](https://github.com/github/advisory-database/blob/main/README.md#supported-ecosystems). This link is maintained to preserve external references. ## Original Description In Magento prior to 1.9.4.3, and Magento prior to 1.14.4.3, an authenticated user with administrative privileges to edit product attributes can execute arbitrary code through crafted layout updates.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | <1.9.4.3 | 1.9.4.3 |
CentOS Libgcc | >=1.5.0.0<1.9.4.3 | |
CentOS Libgcc | >=1.9.0.0<1.14.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2019-8229 vulnerability has been withdrawn and does not affect any supported packages.
CVE-2019-8229 has been determined to not apply to any Magento versions as the advisory was withdrawn.
Since CVE-2019-8229 has been withdrawn, no fix is required or applicable.
CVE-2019-8229 does not affect any products, as the advisory regarding it has been withdrawn.
While CVE-2019-8229 was withdrawn, some archived references may still exist in security documentation.