First published: Wed Jan 29 2020(Updated: )
Magento versions 2.3.3 and earlier, 2.2.10 and earlier, 1.14.4.3 and earlier, and 1.9.4.3 and earlier have a security bypass vulnerability. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magneto/core | <1.9.4.4 | 1.9.4.4 |
composer/magento/community-edition | <=2.2.10 | 2.2.11 |
composer/magento/community-edition | >=2.3.0<=2.3.3 | 2.3.4 |
CentOS Libgcc | <=1.9.4.3 | |
CentOS Libgcc | <=1.14.4.3 | |
CentOS Libgcc | >=2.2.0<=2.2.10 | |
CentOS Libgcc | >=2.2.0<=2.2.10 | |
CentOS Libgcc | >=2.3.0<=2.3.3 | |
CentOS Libgcc | >=2.3.0<=2.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3718 is considered a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2020-3718, update your Magento version to 1.9.4.4, 2.2.11, or 2.3.4.
CVE-2020-3718 affects Magento versions 2.3.3 and earlier, 2.2.10 and earlier, 1.14.4.3 and earlier, and 1.9.4.3 and earlier.
Exploitation of CVE-2020-3718 could allow attackers to execute arbitrary code on the vulnerable Magento installation.
To determine if your Magento installation is vulnerable to CVE-2020-3718, check the version against the affected versions listed in the advisory.