Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an OS command injection via the customer attribute save controller. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/magento/apsb21-08.html | Vendor Advisory |
https://helpx.adobe.com/security/products/magento/apsb21-08.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpx.adobe.com/security/products/magento/apsb21-08.html - Vendor Advisory |
07 Nov 2023, 03:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 8.5
v3 : unknown |
Information
Published : 2021-02-11 20:15
Updated : 2024-11-21 05:47
NVD link : CVE-2021-21015
Mitre link : CVE-2021-21015
CVE.ORG link : CVE-2021-21015
JSON object : View
Products Affected
magento
- magento
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')