First published: Thu Feb 11 2021(Updated: )
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a blind SQL injection vulnerability in the Search module. Successful exploitation could lead to unauthorized access to restricted resources by an unauthenticated attacker. Access to the admin console is required for successful exploitation.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Magento vulnerability is CVE-2021-21024.
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) are affected by this vulnerability.
The severity rating of CVE-2021-21024 is critical with a CVSS score of 9.1.
Successful exploitation of this vulnerability could lead to unauthorized access to restricted resources by an unauthenticated attacker.
You can find more information about this vulnerability at the following link: [Adobe Security Bulletin](https://helpx.adobe.com/security/products/magento/apsb21-08.html).