First published: Mon Jun 28 2021(Updated: )
Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by a Violation of Secure Design Principles vulnerability in RMA PDF filename formats. Successful exploitation could allow an attacker to get unauthorized access to restricted resources.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | <2.3.7 | 2.3.7 |
composer/magento/community-edition | >=2.4.0<2.4.2-p1 | 2.4.2-p1 |
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6-p1 | |
Magento Magento | =2.3.6-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1-p1 | |
Magento Magento | =2.4.1-p1 | |
Magento Magento | =2.4.2 | |
Magento Magento | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Magento vulnerability is CVE-2021-28583.
Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier), and 2.3.6-p1 (and earlier) are affected by this vulnerability.
The severity level of CVE-2021-28583 is high, with a severity value of 4.2.
Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to restricted resources.
Yes, Magento has released a security update to address this vulnerability. It is recommended to update to the latest version of Magento to mitigate the risk.