CVE-2024-34110

Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. A high-privilege attacker could exploit this vulnerability by uploading a malicious file to the system, which could then be executed. Exploitation of this issue does not require user interaction.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce_webhooks:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*

History

09 Jul 2024, 15:09

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce_webhooks:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*
First Time Adobe commerce Webhooks
Adobe
Adobe commerce
Adobe magento
References () https://helpx.adobe.com/security/products/magento/apsb24-40.html - () https://helpx.adobe.com/security/products/magento/apsb24-40.html - Vendor Advisory

13 Jun 2024, 18:35

Type Values Removed Values Added
Summary
  • (es) Las versiones 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de carga sin restricciones de archivos con tipo peligroso que podría provocar la ejecución de código arbitrario. Un atacante con altos privilegios podría aprovechar esta vulnerabilidad cargando un archivo malicioso en el sistema, que luego podría ejecutarse. La explotación de este problema no requiere la interacción del usuario.

13 Jun 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-13 09:15

Updated : 2024-07-09 15:09


NVD link : CVE-2024-34110

Mitre link : CVE-2024-34110

CVE.ORG link : CVE-2024-34110


JSON object : View

Products Affected

adobe

  • commerce
  • magento
  • commerce_webhooks
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type