Vulnerabilites related to openmage - magento
cve-2021-41143
Vulnerability from cvelistv5
Published
2023-01-27 18:02
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85" }, { "name": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T18:02:08.763Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85" }, { "name": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-5vpv-xmcj-9q85", "discovery": "UNKNOWN" }, "title": "OpenMage LTS arbitrary file deletion in customer media allows for remote code execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41143", "datePublished": "2023-01-27T18:02:08.763Z", "dateReserved": "2021-09-15T18:43:17.245Z", "dateUpdated": "2024-08-04T02:59:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39217
Vulnerability from cvelistv5
Published
2023-01-27 17:57
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7" }, { "name": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T17:57:58.255Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7" }, { "name": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-c9q3-r4rv-mjm7", "discovery": "UNKNOWN" }, "title": "OpenMage LTS arbitrary command execution in custom layout update through blocks" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39217", "datePublished": "2023-01-27T17:57:58.255Z", "dateReserved": "2021-08-16T20:13:27.756Z", "dateUpdated": "2024-08-04T01:58:18.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23617
Vulnerability from cvelistv5
Published
2023-01-27 23:24
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m" }, { "name": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T23:24:33.249Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m" }, { "name": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-3p73-mm7v-4f6m", "discovery": "UNKNOWN" }, "title": "OpenMage LTS has DoS vulnerability in MaliciousCode filter" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23617", "datePublished": "2023-01-27T23:24:33.249Z", "dateReserved": "2023-01-16T17:07:46.242Z", "dateUpdated": "2024-08-02T10:35:33.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21426
Vulnerability from cvelistv5
Published
2021-04-21 20:15
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.4.12 Version: <= 20.0.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.4.12" }, { "status": "affected", "version": "\u003c= 20.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-21T20:15:18", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ], "source": { "advisory": "GHSA-m496-x567-f98c", "discovery": "UNKNOWN" }, "title": "Fixes a bug in Zend Framework\u0027s Stream HTTP Wrapper", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21426", "STATE": "PUBLIC", "TITLE": "Fixes a bug in Zend Framework\u0027s Stream HTTP Wrapper" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c= 19.4.12" }, { "version_value": "\u003c= 20.0.8" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ] }, "source": { "advisory": "GHSA-m496-x567-f98c", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21426", "datePublished": "2021-04-21T20:15:18", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:16.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15244
Vulnerability from cvelistv5
Published
2020-10-21 20:05
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.8 Version: >= 20.0.0, < 20.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:23.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.8" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-21T20:05:20", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" } ], "source": { "advisory": "GHSA-jrgf-vfw2-hj26", "discovery": "UNKNOWN" }, "title": "RCE in Magento", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15244", "STATE": "PUBLIC", "TITLE": "RCE in Magento" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.8" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.4" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] }, { "description": [ { "lang": "eng", "value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "name": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" } ] }, "source": { "advisory": "GHSA-jrgf-vfw2-hj26", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15244", "datePublished": "2020-10-21T20:05:20", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:23.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21395
Vulnerability from cvelistv5
Published
2023-01-27 15:03
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1086752 | x_refsource_MISC | |
https://packagist.org/packages/openmage/magento-lts | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4" }, { "name": "https://hackerone.com/reports/1086752", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1086752" }, { "name": "https://packagist.org/packages/openmage/magento-lts", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packagist.org/packages/openmage/magento-lts" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T15:03:32.104Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4" }, { "name": "https://hackerone.com/reports/1086752", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1086752" }, { "name": "https://packagist.org/packages/openmage/magento-lts", "tags": [ "x_refsource_MISC" ], "url": "https://packagist.org/packages/openmage/magento-lts" } ], "source": { "advisory": "GHSA-r3c9-9j5q-pwv4", "discovery": "UNKNOWN" }, "title": "Magneto-lts vulnerable to Cross-Site Request Forgery" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21395", "datePublished": "2023-01-27T15:03:32.104Z", "dateReserved": "2020-12-22T15:16:46.068Z", "dateUpdated": "2024-08-03T18:09:16.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41231
Vulnerability from cvelistv5
Published
2023-01-27 18:12
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T18:12:01.408Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-h632-p764-pjqm", "discovery": "UNKNOWN" }, "title": "OpenMage LTS DataFlow upload remote code execution vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41231", "datePublished": "2023-01-27T18:12:01.408Z", "dateReserved": "2021-09-15T18:43:17.291Z", "dateUpdated": "2024-08-04T03:08:31.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21427
Vulnerability from cvelistv5
Published
2021-04-21 20:55
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.4.12 Version: <= 20.0.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.4.12" }, { "status": "affected", "version": "\u003c= 20.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-21T20:55:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ], "source": { "advisory": "GHSA-fvrf-9428-527m", "discovery": "UNKNOWN" }, "title": "Backport for CVE-2021-21024 Blind SQLi from Magento 2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21427", "STATE": "PUBLIC", "TITLE": "Backport for CVE-2021-21024 Blind SQLi from Magento 2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c= 19.4.12" }, { "version_value": "\u003c= 20.0.8" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ] }, "source": { "advisory": "GHSA-fvrf-9428-527m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21427", "datePublished": "2021-04-21T20:55:14", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:16.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41879
Vulnerability from cvelistv5
Published
2023-09-11 21:14
Modified
2024-09-26 16:55
Severity ?
EPSS score ?
Summary
Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.5.0 Version: >= 20.0.0, <= 20.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "name": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "name": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*" ], "defaultStatus": "unknown", "product": "magento", "vendor": "openmage", "versions": [ { "lessThanOrEqual": "19.5.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "20.1.0", "status": "affected", "version": "20.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41879", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T16:53:59.562897Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T16:55:58.992Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.5.0" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c= 20.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a \"guest-view\" cookie which contains the order\u0027s \"protect_code\". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-11T21:14:28.597Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "name": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "name": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" } ], "source": { "advisory": "GHSA-9358-cpvx-c2qp", "discovery": "UNKNOWN" }, "title": "Magento LTS\u0027s guest order \"protect code\" can be brute-forced too easily" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41879", "datePublished": "2023-09-11T21:14:28.597Z", "dateReserved": "2023-09-04T16:31:48.223Z", "dateUpdated": "2024-09-26T16:55:58.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41144
Vulnerability from cvelistv5
Published
2023-01-27 18:08
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T18:08:42.087Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-5j2g-3ph4-rgvm", "discovery": "UNKNOWN" }, "title": "OpenMage LTS authenticated remote code execution through layout update" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41144", "datePublished": "2023-01-27T18:08:42.087Z", "dateReserved": "2021-09-15T18:43:17.245Z", "dateUpdated": "2024-08-04T02:59:31.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32759
Vulnerability from cvelistv5
Published
2021-08-27 22:00
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.15 Version: >= 20, < 20.0.13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.15" }, { "status": "affected", "version": "\u003e= 20, \u003c 20.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-27T22:00:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" } ], "source": { "advisory": "GHSA-xm9f-vxmx-4m58", "discovery": "UNKNOWN" }, "title": "Data Flow Sanitation Issue Fix ", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32759", "STATE": "PUBLIC", "TITLE": "Data Flow Sanitation Issue Fix " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.15" }, { "version_value": "\u003e= 20, \u003c 20.0.13" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" } ] }, "source": { "advisory": "GHSA-xm9f-vxmx-4m58", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32759", "datePublished": "2021-08-27T22:00:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41676
Vulnerability from cvelistv5
Published
2024-07-29 14:46
Modified
2024-08-02 04:46
Severity ?
EPSS score ?
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.
But because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 20.10.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41676", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T15:41:02.179288Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T15:41:08.994Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2" }, { "name": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 20.10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.\nBut because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-29T14:46:26.806Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2" }, { "name": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948" } ], "source": { "advisory": "GHSA-5vrp-638w-p8m2", "discovery": "UNKNOWN" }, "title": "Magento LTS vulnerable to stored Cross-site Scripting (XSS) in admin system configs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41676", "datePublished": "2024-07-29T14:46:26.806Z", "dateReserved": "2024-07-18T15:21:47.486Z", "dateUpdated": "2024-08-02T04:46:52.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-04-21 21:15
Modified
2024-11-21 05:48
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "1A4C7D1B-4241-408B-BD8C-7B996FAC4D0E", "versionEndExcluding": "19.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "713655CF-09C7-4347-A8D1-4B226F1DE312", "versionEndExcluding": "20.0.9", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9." }, { "lang": "es", "value": "Magento-lts es una alternativa de soporte a largo plazo a Magento Community Edition (CE).\u0026#xa0;Una vulnerabilidad en magento-lts versiones anteriores a 19.4.13 y 20.0.9, potencialmente permite a un administrador acceso no autorizado a recursos restringidos.\u0026#xa0;Este es una puerta trasera de CVE-2021-21024.\u0026#xa0;La vulnerabilidad est\u00e1 parcheada en versiones 19.4.13 y 20.0.9" } ], "id": "CVE-2021-21427", "lastModified": "2024-11-21T05:48:20.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-21T21:15:08.007", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-27 19:15
Modified
2024-11-21 06:25
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B87F8CA0-6C21-4615-A520-39F1E9E737D5", "versionEndExcluding": "19.4.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "15B9BC3F-BF81-4DF5-B57B-ECF7059A7991", "versionEndExcluding": "20.0.19", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n" }, { "lang": "es", "value": "OpenMage LTS es una plataforma de comercio electr\u00f3nico. Antes de las versiones 19.4.22 y 20.0.19, los usuarios administradores de Magento con acceso a los medios del cliente pod\u00edan ejecutar c\u00f3digo en el servidor. Las versiones 19.4.22 y 20.0.19 contienen un parche para este problema." } ], "id": "CVE-2021-41143", "lastModified": "2024-11-21T06:25:34.993", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-27T19:15:09.377", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-21 21:15
Modified
2024-11-21 05:48
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "1A4C7D1B-4241-408B-BD8C-7B996FAC4D0E", "versionEndExcluding": "19.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "713655CF-09C7-4347-A8D1-4B226F1DE312", "versionEndExcluding": "20.0.9", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework." }, { "lang": "es", "value": "Magento-lts es una alternativa de soporte a largo plazo a Magento Community Edition (CE).\u0026#xa0;En magento-lts versiones 19.4.12 y anteriores y versiones 20.0.8 y anteriores, se presenta una vulnerabilidad causada por una deserializaci\u00f3n no segura de un objeto.\u0026#xa0;Un parche en versiones 19.4.13 y 20.0.9 fue actualizado desde Zend Framework 3. La vulnerabilidad fue asignada CVE-2021-3007 en Zend Framework" } ], "id": "CVE-2021-21426", "lastModified": "2024-11-21T05:48:20.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-21T21:15:07.960", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-29 15:15
Modified
2024-11-21 09:32
Severity ?
4.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.
But because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "574AE399-A76D-4A0D-964E-0C0F6D5567E6", "versionEndExcluding": "20.10.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.\nBut because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher." }, { "lang": "es", "value": "Magento-lts es una alternativa de soporte a largo plazo a Magento Community Edition (CE). Esta vulnerabilidad de XSS afecta las configuraciones del sistema design/header/welcome, design/header/logo_src, design/header/logo_src_small y design/header/logo_alt. Su objetivo es permitir a los administradores establecer un texto en los dos casos y definir una URL de imagen para los otros dos casos. Pero debido a que anteriormente faltaba el escape, se permit\u00eda ingresar HTML arbitrario y, como consecuencia, tambi\u00e9n JavaScript arbitrario. El problema se solucion\u00f3 con la versi\u00f3n 20.10.1 o superior." } ], "id": "CVE-2024-41676", "lastModified": "2024-11-21T09:32:57.240", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-29T15:15:16.040", "references": [ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-27 19:15
Modified
2024-11-21 06:25
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B87F8CA0-6C21-4615-A520-39F1E9E737D5", "versionEndExcluding": "19.4.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "15B9BC3F-BF81-4DF5-B57B-ECF7059A7991", "versionEndExcluding": "20.0.19", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n\n" }, { "lang": "es", "value": "OpenMage LTS es una plataforma de comercio electr\u00f3nico. Antes de las versiones 19.4.22 y 20.0.19, un administrador con permisos para cargar archivos a trav\u00e9s de DataFlow y crear productos pod\u00eda ejecutar c\u00f3digo arbitrario a trav\u00e9s del perfil de conversi\u00f3n. Las versiones 19.4.22 y 20.0.19 contienen un parche para este problema." } ], "id": "CVE-2021-41231", "lastModified": "2024-11-21T06:25:50.460", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-27T19:15:10.197", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-27 22:15
Modified
2024-11-21 06:07
Severity ?
Summary
OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC504488-1E7B-47F0-974C-13226C2746C9", "versionEndExcluding": "19.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:*:*:*:*", "matchCriteriaId": "910B6891-02D5-41C7-AABF-2BE5C6917891", "versionEndExcluding": "20.0.11", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue." }, { "lang": "es", "value": "OpenMage magento-lts es una alternativa a las versiones oficiales de Magento CE. Debido a una falta de saneamiento en el flujo de datos en las versiones anteriores a 19.4.15 y 20.0.13, era posible que los usuarios administradores cargaran archivos ejecutables arbitrarios al servidor. OpenMage versiones 19.4.15 y 20.0.13, presentan un parche para este problema." } ], "id": "CVE-2021-32759", "lastModified": "2024-11-21T06:07:40.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2021-08-27T22:15:07.193", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-27 18:15
Modified
2024-11-21 06:18
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B87F8CA0-6C21-4615-A520-39F1E9E737D5", "versionEndExcluding": "19.4.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "15B9BC3F-BF81-4DF5-B57B-ECF7059A7991", "versionEndExcluding": "20.0.19", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue." }, { "lang": "es", "value": "OpenMage LTS es una plataforma de comercio electr\u00f3nico. Antes de las versiones 19.4.22 y 20.0.19, el dise\u00f1o personalizado permit\u00eda a los usuarios administradores ejecutar comandos arbitrarios mediante m\u00e9todos de bloqueo. Las versiones 19.4.22 y 20.0.19 contienen parches para este problema." } ], "id": "CVE-2021-39217", "lastModified": "2024-11-21T06:18:55.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-27T18:15:09.087", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-21 20:15
Modified
2024-11-21 05:05
Severity ?
8.0 (High) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "1E9C46F6-A8E6-4007-8100-4B03FD5C2BB8", "versionEndIncluding": "19.4.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B47620C2-89F6-4061-ACA8-2CCF37FC0449", "versionEndExcluding": "20.0.4", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4." }, { "lang": "es", "value": "En Magento (paquete rubygems openmage/magento-lts) versiones anteriores a 19.4.8 y 20.0.4, un usuario administrador puede generar credenciales soap que pueden ser usadas para activar una RCE por medio de la inyecci\u00f3n de objetos PHP mediante atributos de producto y un producto.\u0026#xa0;El problema est\u00e1 parcheado en las versiones 19.4.8 y 20.0.4" } ], "id": "CVE-2020-15244", "lastModified": "2024-11-21T05:05:10.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-21T20:15:13.443", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "source": "nvd@nist.gov", "tags": [ "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" }, { "lang": "en", "value": "CWE-502" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-11 22:15
Modified
2024-11-21 08:21
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "C2C082C2-33B8-42AA-A80D-7FC64CBEA8A4", "versionEndExcluding": "19.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "C0ACC44D-FE37-4C32-B49F-DD00D3CAA1DA", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a \"guest-view\" cookie which contains the order\u0027s \"protect_code\". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1." }, { "lang": "es", "value": "Magento LTS es el c\u00f3digo base oficial de OpenMage LTS. Los pedidos de invitados se pueden ver sin autenticaci\u00f3n utilizando una cookie de \"guest-view\" que contiene el \"protect_code\" del pedido. Este c\u00f3digo tiene 6 caracteres hexadecimales, lo que podr\u00eda decirse que no es suficiente para evitar un ataque de fuerza bruta. Exponer cada orden requerir\u00eda un ataque de fuerza bruta por separado. Este problema se solucion\u00f3 en las versiones 19.5.1 y 20.1.1." } ], "id": "CVE-2023-41879", "lastModified": "2024-11-21T08:21:50.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-11T22:15:08.267", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-28 00:15
Modified
2024-11-21 07:46
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B87F8CA0-6C21-4615-A520-39F1E9E737D5", "versionEndExcluding": "19.4.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "15B9BC3F-BF81-4DF5-B57B-ECF7059A7991", "versionEndExcluding": "20.0.19", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds." }, { "lang": "es", "value": "OpenMage LTS es una plataforma de comercio electr\u00f3nico. Las versiones anteriores a 19.4.22 y 20.0.19 contienen un bucle infinito en el filtro de c\u00f3digo malicioso en determinadas condiciones. Las versiones 19.4.22 y 20.0.19 tienen una soluci\u00f3n para este problema. No se conocen workarounds." } ], "id": "CVE-2023-23617", "lastModified": "2024-11-21T07:46:32.583", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-28T00:15:09.173", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-27 16:15
Modified
2024-11-21 05:48
Severity ?
4.2 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4 | Third Party Advisory | |
security-advisories@github.com | https://hackerone.com/reports/1086752 | Exploit, Third Party Advisory | |
security-advisories@github.com | https://packagist.org/packages/openmage/magento-lts | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1086752 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://packagist.org/packages/openmage/magento-lts | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B87F8CA0-6C21-4615-A520-39F1E9E737D5", "versionEndExcluding": "19.4.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "15B9BC3F-BF81-4DF5-B57B-ECF7059A7991", "versionEndExcluding": "20.0.19", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds." }, { "lang": "es", "value": "Magneto LTS (soporte a largo plazo) es una alternativa desarrollada por la comunidad a los lanzamientos oficiales de Magento CE. Las versiones anteriores a 19.4.22 y 20.0.19 son vulnerables a Cross Site Request Forgery. El formulario de restablecimiento de contrase\u00f1a es vulnerable a CSRF entre el momento en que se hace clic en el enlace de restablecimiento de contrase\u00f1a y el usuario env\u00eda una nueva contrase\u00f1a. Este problema se solucion\u00f3 en las versiones 19.4.22 y 20.0.19. No hay workarounds." } ], "id": "CVE-2021-21395", "lastModified": "2024-11-21T05:48:16.257", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-27T16:15:08.323", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1086752" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://packagist.org/packages/openmage/magento-lts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1086752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://packagist.org/packages/openmage/magento-lts" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-27 19:15
Modified
2024-11-21 06:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B87F8CA0-6C21-4615-A520-39F1E9E737D5", "versionEndExcluding": "19.4.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*", "matchCriteriaId": "15B9BC3F-BF81-4DF5-B57B-ECF7059A7991", "versionEndExcluding": "20.0.19", "versionStartIncluding": "20.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n\n" }, { "lang": "es", "value": "OpenMage LTS es una plataforma de comercio electr\u00f3nico. Antes de las versiones 19.4.22 y 20.0.19, un bloque de dise\u00f1o pod\u00eda omitir la lista negra de bloques para ejecutar c\u00f3digo remoto. Las versiones 19.4.22 y 20.0.19 contienen un parche para este problema." } ], "id": "CVE-2021-41144", "lastModified": "2024-11-21T06:25:35.163", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-27T19:15:09.963", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }