First published: Thu Feb 11 2021(Updated: )
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to OS command injection via the scheduled operation module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | >=2.4.0<2.4.1-p1 | 2.4.1-p1 |
composer/magento/community-edition | <2.3.6 | 2.3.6 |
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21018 is a vulnerability in Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) that allows OS command injection through the scheduled operation module, leading to arbitrary code execution by an authenticated attacker.
CVE-2021-21018 has a severity rating of 9.1 (critical).
The affected software for CVE-2021-21018 includes Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) in both the commerce and open source editions.
To fix CVE-2021-21018, you should update Magento to the latest version available and apply any relevant patches provided by the vendor.
You can find more information about CVE-2021-21018 on the Adobe Security Bulletin APSB21-08: <a href='https://helpx.adobe.com/security/products/magento/apsb21-08.html'>https://helpx.adobe.com/security/products/magento/apsb21-08.html</a>.