First published: Wed Sep 06 2023(Updated: )
Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper access control vulnerability within Magento's Media Gallery Upload workflow. By storing a specially crafted file in the website gallery, an authenticated attacker with administrative privilege can gain access to delete the .htaccess file. This could result in the attacker achieving remote code execution.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Magento Magento | <2.3.7 | |
Magento Magento | <2.3.7 | |
Magento Magento | >=2.4.0<2.4.2 | |
Magento Magento | >=2.4.0<2.4.2 | |
Magento Magento | =2.3.7 | |
Magento Magento | =2.3.7 | |
Magento Magento | =2.4.2 | |
Magento Magento | =2.4.2 | |
Magento Magento | =2.4.2-p1 | |
Magento Magento | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Magento vulnerability is CVE-2021-36036.
The severity of CVE-2021-36036 is high.
Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) are affected by CVE-2021-36036.
CVE-2021-36036 allows an authenticated attacker with administrative privileges to upload a specially crafted file, leading to an improper access control vulnerability within Magento's Media Gallery.
Yes, Adobe has released a security update to address CVE-2021-36036. It is recommended to update Magento to the latest version available.