First published: Tue Feb 09 2021(Updated: )
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an OS command injection via the customer attribute save controller. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | >=2.4.0<2.4.2 | 2.4.2 |
composer/magento/community-edition | <2.3.6-p1 | 2.3.6-p1 |
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-21015 is high.
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) are affected by CVE-2021-21015.
CVE-2021-21015 is an OS command injection vulnerability via the customer attribute save controller in Magento.
Successful exploitation of CVE-2021-21015 could lead to arbitrary code execution by an authenticated attacker.
To mitigate CVE-2021-21015, ensure that you have updated to the latest version of Magento that includes the security patch provided by Adobe.