First published: Thu Feb 25 2021(Updated: )
Magento UPWARD-php version 1.1.4 (and earlier) is affected by a Path traversal vulnerability in Magento UPWARD Connector version 1.1.2 (and earlier) due to the upload feature. An attacker could potentially exploit this vulnerability to upload a malicious YAML file that can contain instructions which allows reading arbitrary files from the remote server. Access to the admin console is required for successful exploitation.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Magento UPWARD Connector | <=1.1.2 | |
Magento Upward Php | <=1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Magento UPWARD-php vulnerability is CVE-2021-21064.
The severity of CVE-2021-21064 is medium with a severity value of 4.9.
Magento UPWARD Connector version 1.1.2 (and earlier) and Magento UPWARD-php version 1.1.4 (and earlier) are affected by CVE-2021-21064.
CVE-2021-21064 is a Path traversal vulnerability in Magento UPWARD Connector that can be exploited by uploading a malicious YAML file containing instructions.
To fix CVE-2021-21064, upgrade to Magento UPWARD Connector version 1.1.3 or later and Magento UPWARD-php version 1.1.5 or later.