First published: Wed Aug 14 2024(Updated: )
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | =2.4.4 | |
composer/magento/community-edition | <2.4.4-p10 | 2.4.4-p10 |
composer/magento/community-edition | =2.4.5 | |
composer/magento/community-edition | >=2.4.5-p1<2.4.5-p9 | 2.4.5-p9 |
composer/magento/community-edition | =2.4.6 | |
composer/magento/community-edition | >=2.4.6-p1<2.4.6-p7 | 2.4.6-p7 |
composer/magento/community-edition | =2.4.7 | |
composer/magento/community-edition | >=2.4.7-p1<2.4.7-p2 | 2.4.7-p2 |
Adobe Magento Commerce | <=2.4.3 | |
Adobe Magento Commerce | =2.4.4 | |
Adobe Magento Commerce | =2.4.4-p1 | |
Adobe Magento Commerce | =2.4.4-p2 | |
Adobe Magento Commerce | =2.4.4-p3 | |
Adobe Magento Commerce | =2.4.4-p4 | |
Adobe Magento Commerce | =2.4.4-p5 | |
Adobe Magento Commerce | =2.4.4-p6 | |
Adobe Magento Commerce | =2.4.4-p7 | |
Adobe Magento Commerce | =2.4.4-p8 | |
Adobe Magento Commerce | =2.4.4-p9 | |
Adobe Magento Commerce | =2.4.5 | |
Adobe Magento Commerce | =2.4.5-p1 | |
Adobe Magento Commerce | =2.4.5-p2 | |
Adobe Magento Commerce | =2.4.5-p3 | |
Adobe Magento Commerce | =2.4.5-p4 | |
Adobe Magento Commerce | =2.4.5-p5 | |
Adobe Magento Commerce | =2.4.5-p6 | |
Adobe Magento Commerce | =2.4.5-p7 | |
Adobe Magento Commerce | =2.4.5-p8 | |
Adobe Magento Commerce | =2.4.6 | |
Adobe Magento Commerce | =2.4.6-p1 | |
Adobe Magento Commerce | =2.4.6-p2 | |
Adobe Magento Commerce | =2.4.6-p3 | |
Adobe Magento Commerce | =2.4.6-p4 | |
Adobe Magento Commerce | =2.4.6-p5 | |
Adobe Magento Commerce | =2.4.6-p6 | |
Adobe Magento Commerce | =2.4.7 | |
Adobe Magento Commerce | =2.4.7-b1 | |
Adobe Magento Commerce | =2.4.7-b2 | |
Adobe Magento Commerce | =2.4.7-p1 | |
Adobe Magento Open Source | <=2.4.3 | |
Adobe Magento Open Source | =2.4.4 | |
Adobe Magento Open Source | =2.4.4-p1 | |
Adobe Magento Open Source | =2.4.4-p2 | |
Adobe Magento Open Source | =2.4.4-p3 | |
Adobe Magento Open Source | =2.4.4-p4 | |
Adobe Magento Open Source | =2.4.4-p5 | |
Adobe Magento Open Source | =2.4.4-p6 | |
Adobe Magento Open Source | =2.4.4-p7 | |
Adobe Magento Open Source | =2.4.4-p8 | |
Adobe Magento Open Source | =2.4.4-p9 | |
Adobe Magento Open Source | =2.4.5 | |
Adobe Magento Open Source | =2.4.5-p1 | |
Adobe Magento Open Source | =2.4.5-p2 | |
Adobe Magento Open Source | =2.4.5-p3 | |
Adobe Magento Open Source | =2.4.5-p4 | |
Adobe Magento Open Source | =2.4.5-p5 | |
Adobe Magento Open Source | =2.4.5-p6 | |
Adobe Magento Open Source | =2.4.5-p7 | |
Adobe Magento Open Source | =2.4.5-p8 | |
Adobe Magento Open Source | =2.4.6 | |
Adobe Magento Open Source | =2.4.6-p1 | |
Adobe Magento Open Source | =2.4.6-p2 | |
Adobe Magento Open Source | =2.4.6-p3 | |
Adobe Magento Open Source | =2.4.6-p4 | |
Adobe Magento Open Source | =2.4.6-p5 | |
Adobe Magento Open Source | =2.4.6-p6 | |
Adobe Magento Open Source | =2.4.7 | |
Adobe Magento Open Source | =2.4.7-b1 | |
Adobe Magento Open Source | =2.4.7-b2 | |
Adobe Magento Open Source | =2.4.7-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39409 has a moderate severity rating as it involves a Cross-Site Request Forgery (CSRF) vulnerability allowing minor integrity changes.
To fix CVE-2024-39409, update to Adobe Commerce version 2.4.4-p10, 2.4.5-p9, 2.4.6-p7, or 2.4.7-p2.
CVE-2024-39409 affects Adobe Commerce versions 2.4.4-p9 and earlier, including 2.4.5, 2.4.6, and 2.4.7-p1.
CVE-2024-39409 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2024-39409 could allow attackers to bypass security features and perform minor integrity changes on behalf of authenticated users.