First published: Tue Nov 05 2019(Updated: )
In Magento Open Source prior to 1.9.4.3, and Magento Commerce prior to 1.14.4.3, an authenticated user with administrative privileges to edit configuration settings can execute arbitrary code through a crafted support/output path.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/core | <1.9.4.3 | 1.9.4.3 |
CentOS Libgcc | >=1.5.0.0<1.9.4.3 | |
CentOS Libgcc | >=1.9.0.0<1.14.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8230 has been classified as a critical vulnerability due to the potential for arbitrary code execution by authenticated users with administrative privileges.
To fix CVE-2019-8230, upgrade your Magento Open Source to version 1.9.4.3 or Magento Commerce to version 1.14.4.3 or later.
CVE-2019-8230 affects Magento Open Source versions prior to 1.9.4.3 and Magento Commerce versions prior to 1.14.4.3.
An attacker exploiting CVE-2019-8230 could execute arbitrary code on the server, potentially leading to further compromise of the system.
An authenticated user with administrative privileges can exploit CVE-2019-8230 to execute arbitrary code through a crafted support/output path.