A security bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 that could be abused to execute arbitrary PHP code. An authenticated user can bypass security protections that prevent arbitrary PHP script upload via form data injection.
References
Link | Resource |
---|---|
https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13 | Vendor Advisory |
https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13 - Vendor Advisory |
Information
Published : 2019-08-02 22:15
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7871
Mitre link : CVE-2019-7871
CVE.ORG link : CVE-2019-7871
JSON object : View
Products Affected
magento
- magento
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')