First published: Mon Nov 09 2020(Updated: )
Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability in the Integrations component. This vulnerability could be abused by authenticated users with permissions to the Resource Access API to delete customer details via the REST API without authorization.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | =2.4.0 | 2.4.1 |
composer/magento/community-edition | <2.3.6 | 2.3.6 |
Magento Magento | <2.3.5 | |
Magento Magento | <2.3.5 | |
Magento Magento | =2.3.5 | |
Magento Magento | =2.3.5 | |
Magento Magento | =2.3.5-p1 | |
Magento Magento | =2.3.5-p1 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Magento vulnerability is CVE-2020-24402.
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by this vulnerability.
The severity rating of CVE-2020-24402 is medium (4.9).
This vulnerability allows authenticated users with permissions to the Resource Access API to delete customer details via the REST API without authorization.
There is no known fix for this vulnerability at the moment. It is recommended to apply the latest security patches provided by Magento.