Vulnerabilites related to OpenMage - magento-lts
cve-2023-23617
Vulnerability from cvelistv5
Published
2023-01-27 23:24
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m" }, { "name": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T23:24:33.249Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m" }, { "name": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-3p73-mm7v-4f6m", "discovery": "UNKNOWN" }, "title": "OpenMage LTS has DoS vulnerability in MaliciousCode filter" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23617", "datePublished": "2023-01-27T23:24:33.249Z", "dateReserved": "2023-01-16T17:07:46.242Z", "dateUpdated": "2024-08-02T10:35:33.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21395
Vulnerability from cvelistv5
Published
2023-01-27 15:03
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1086752 | x_refsource_MISC | |
https://packagist.org/packages/openmage/magento-lts | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4" }, { "name": "https://hackerone.com/reports/1086752", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1086752" }, { "name": "https://packagist.org/packages/openmage/magento-lts", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packagist.org/packages/openmage/magento-lts" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T15:03:32.104Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4" }, { "name": "https://hackerone.com/reports/1086752", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1086752" }, { "name": "https://packagist.org/packages/openmage/magento-lts", "tags": [ "x_refsource_MISC" ], "url": "https://packagist.org/packages/openmage/magento-lts" } ], "source": { "advisory": "GHSA-r3c9-9j5q-pwv4", "discovery": "UNKNOWN" }, "title": "Magneto-lts vulnerable to Cross-Site Request Forgery" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21395", "datePublished": "2023-01-27T15:03:32.104Z", "dateReserved": "2020-12-22T15:16:46.068Z", "dateUpdated": "2024-08-03T18:09:16.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41231
Vulnerability from cvelistv5
Published
2023-01-27 18:12
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T18:12:01.408Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-h632-p764-pjqm", "discovery": "UNKNOWN" }, "title": "OpenMage LTS DataFlow upload remote code execution vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41231", "datePublished": "2023-01-27T18:12:01.408Z", "dateReserved": "2021-09-15T18:43:17.291Z", "dateUpdated": "2024-08-04T03:08:31.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26285
Vulnerability from cvelistv5
Published
2021-01-21 13:30
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to import/export data and to create widget instances was able to inject an executable file on the server. The latest OpenMage Versions up from 19.4.9 and 20.0.5 have this Issue solved
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-hj6w-xrv3-wjj9 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/4132668f5009f17456fe644742026f56d2297586 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.10 Version: >= 20.0.0, < 20.0.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:04.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-hj6w-xrv3-wjj9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/4132668f5009f17456fe644742026f56d2297586" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.10" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to import/export data and to create widget instances was able to inject an executable file on the server. The latest OpenMage Versions up from 19.4.9 and 20.0.5 have this Issue solved" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-21T13:30:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-hj6w-xrv3-wjj9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/4132668f5009f17456fe644742026f56d2297586" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10" } ], "source": { "advisory": "GHSA-hj6w-xrv3-wjj9", "discovery": "UNKNOWN" }, "title": "Widget instances allows a hacker to inject an executable file on the server on OpenMage", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26285", "STATE": "PUBLIC", "TITLE": "Widget instances allows a hacker to inject an executable file on the server on OpenMage" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.10" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.5" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to import/export data and to create widget instances was able to inject an executable file on the server. The latest OpenMage Versions up from 19.4.9 and 20.0.5 have this Issue solved" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-hj6w-xrv3-wjj9", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-hj6w-xrv3-wjj9" }, { "name": "https://github.com/OpenMage/magento-lts/commit/4132668f5009f17456fe644742026f56d2297586", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/commit/4132668f5009f17456fe644742026f56d2297586" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10" } ] }, "source": { "advisory": "GHSA-hj6w-xrv3-wjj9", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26285", "datePublished": "2021-01-21T13:30:17", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:04.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41676
Vulnerability from cvelistv5
Published
2024-07-29 14:46
Modified
2024-08-02 04:46
Severity ?
EPSS score ?
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.
But because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 20.10.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41676", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T15:41:02.179288Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T15:41:08.994Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2" }, { "name": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 20.10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.\nBut because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-29T14:46:26.806Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2" }, { "name": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948" } ], "source": { "advisory": "GHSA-5vrp-638w-p8m2", "discovery": "UNKNOWN" }, "title": "Magento LTS vulnerable to stored Cross-site Scripting (XSS) in admin system configs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41676", "datePublished": "2024-07-29T14:46:26.806Z", "dateReserved": "2024-07-18T15:21:47.486Z", "dateUpdated": "2024-08-02T04:46:52.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21426
Vulnerability from cvelistv5
Published
2021-04-21 20:15
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.4.12 Version: <= 20.0.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.4.12" }, { "status": "affected", "version": "\u003c= 20.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-21T20:15:18", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ], "source": { "advisory": "GHSA-m496-x567-f98c", "discovery": "UNKNOWN" }, "title": "Fixes a bug in Zend Framework\u0027s Stream HTTP Wrapper", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21426", "STATE": "PUBLIC", "TITLE": "Fixes a bug in Zend Framework\u0027s Stream HTTP Wrapper" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c= 19.4.12" }, { "version_value": "\u003c= 20.0.8" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" } ] }, "source": { "advisory": "GHSA-m496-x567-f98c", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21426", "datePublished": "2021-04-21T20:15:18", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:16.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41143
Vulnerability from cvelistv5
Published
2023-01-27 18:02
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85" }, { "name": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T18:02:08.763Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85" }, { "name": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-5vpv-xmcj-9q85", "discovery": "UNKNOWN" }, "title": "OpenMage LTS arbitrary file deletion in customer media allows for remote code execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41143", "datePublished": "2023-01-27T18:02:08.763Z", "dateReserved": "2021-09-15T18:43:17.245Z", "dateUpdated": "2024-08-04T02:59:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32758
Vulnerability from cvelistv5
Published
2021-08-27 17:30
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.15 Version: >= 20, < 20.0.11 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.15" }, { "status": "affected", "version": "\u003e= 20, \u003c 20.0.11" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91: XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-27T17:30:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11" } ], "source": { "advisory": "GHSA-26rr-v2j2-25fh", "discovery": "UNKNOWN" }, "title": "Layout XML Arbitrary Code Fix ", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32758", "STATE": "PUBLIC", "TITLE": "Layout XML Arbitrary Code Fix " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.15" }, { "version_value": "\u003e= 20, \u003c 20.0.11" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-91: XML Injection (aka Blind XPath Injection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.11" } ] }, "source": { "advisory": "GHSA-26rr-v2j2-25fh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32758", "datePublished": "2021-08-27T17:30:10", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21427
Vulnerability from cvelistv5
Published
2021-04-21 20:55
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.4.12 Version: <= 20.0.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.4.12" }, { "status": "affected", "version": "\u003c= 20.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-21T20:55:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ], "source": { "advisory": "GHSA-fvrf-9428-527m", "discovery": "UNKNOWN" }, "title": "Backport for CVE-2021-21024 Blind SQLi from Magento 2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21427", "STATE": "PUBLIC", "TITLE": "Backport for CVE-2021-21024 Blind SQLi from Magento 2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c= 19.4.12" }, { "version_value": "\u003c= 20.0.8" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m" } ] }, "source": { "advisory": "GHSA-fvrf-9428-527m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21427", "datePublished": "2021-04-21T20:55:14", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:16.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41879
Vulnerability from cvelistv5
Published
2023-09-11 21:14
Modified
2024-09-26 16:55
Severity ?
EPSS score ?
Summary
Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.5.0 Version: >= 20.0.0, <= 20.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "name": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "name": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*" ], "defaultStatus": "unknown", "product": "magento", "vendor": "openmage", "versions": [ { "lessThanOrEqual": "19.5.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "20.1.0", "status": "affected", "version": "20.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41879", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T16:53:59.562897Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T16:55:58.992Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.5.0" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c= 20.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a \"guest-view\" cookie which contains the order\u0027s \"protect_code\". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-11T21:14:28.597Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "name": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "name": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" } ], "source": { "advisory": "GHSA-9358-cpvx-c2qp", "discovery": "UNKNOWN" }, "title": "Magento LTS\u0027s guest order \"protect code\" can be brute-forced too easily" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41879", "datePublished": "2023-09-11T21:14:28.597Z", "dateReserved": "2023-09-04T16:31:48.223Z", "dateUpdated": "2024-09-26T16:55:58.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26295
Vulnerability from cvelistv5
Published
2021-01-21 13:40
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, an administrator with permission to import/export data and to edit cms pages was able to inject an executable file on the server via layout xml. The latest OpenMage Versions up from 19.4.9 and 20.0.5 have this Issue solved
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-52c6-6v3v-f3fg | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/9cf8c0aa1d1306051a18ace08d40279dadc1fb35 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.10 Version: >= 20.0.0, < 20.0.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:03.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-52c6-6v3v-f3fg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/9cf8c0aa1d1306051a18ace08d40279dadc1fb35" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.10" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, an administrator with permission to import/export data and to edit cms pages was able to inject an executable file on the server via layout xml. The latest OpenMage Versions up from 19.4.9 and 20.0.5 have this Issue solved" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-21T13:40:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-52c6-6v3v-f3fg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/9cf8c0aa1d1306051a18ace08d40279dadc1fb35" } ], "source": { "advisory": "GHSA-52c6-6v3v-f3fg", "discovery": "UNKNOWN" }, "title": "CMS Editor code execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26295", "STATE": "PUBLIC", "TITLE": "CMS Editor code execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.10" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.6" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.5, an administrator with permission to import/export data and to edit cms pages was able to inject an executable file on the server via layout xml. The latest OpenMage Versions up from 19.4.9 and 20.0.5 have this Issue solved" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.10" }, { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-52c6-6v3v-f3fg", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-52c6-6v3v-f3fg" }, { "name": "https://github.com/OpenMage/magento-lts/commit/9cf8c0aa1d1306051a18ace08d40279dadc1fb35", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/commit/9cf8c0aa1d1306051a18ace08d40279dadc1fb35" } ] }, "source": { "advisory": "GHSA-52c6-6v3v-f3fg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26295", "datePublished": "2021-01-21T13:40:19", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:03.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39217
Vulnerability from cvelistv5
Published
2023-01-27 17:57
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7" }, { "name": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T17:57:58.255Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7" }, { "name": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-c9q3-r4rv-mjm7", "discovery": "UNKNOWN" }, "title": "OpenMage LTS arbitrary command execution in custom layout update through blocks" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39217", "datePublished": "2023-01-27T17:57:58.255Z", "dateReserved": "2021-08-16T20:13:27.756Z", "dateUpdated": "2024-08-04T01:58:18.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41144
Vulnerability from cvelistv5
Published
2023-01-27 18:08
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.22 Version: >= 20.0.0, < 20.0.19 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.22" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.19" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T18:08:42.087Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm" }, { "name": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19" } ], "source": { "advisory": "GHSA-5j2g-3ph4-rgvm", "discovery": "UNKNOWN" }, "title": "OpenMage LTS authenticated remote code execution through layout update" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41144", "datePublished": "2023-01-27T18:08:42.087Z", "dateReserved": "2021-09-15T18:43:17.245Z", "dateUpdated": "2024-08-04T02:59:31.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15244
Vulnerability from cvelistv5
Published
2020-10-21 20:05
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.8 Version: >= 20.0.0, < 20.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:23.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.8" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-21T20:05:20", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" } ], "source": { "advisory": "GHSA-jrgf-vfw2-hj26", "discovery": "UNKNOWN" }, "title": "RCE in Magento", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15244", "STATE": "PUBLIC", "TITLE": "RCE in Magento" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.8" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.4" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] }, { "description": [ { "lang": "eng", "value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26" }, { "name": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b" } ] }, "source": { "advisory": "GHSA-jrgf-vfw2-hj26", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15244", "datePublished": "2020-10-21T20:05:20", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:23.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32759
Vulnerability from cvelistv5
Published
2021-08-27 22:00
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15 | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.15 Version: >= 20, < 20.0.13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.15" }, { "status": "affected", "version": "\u003e= 20, \u003c 20.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-27T22:00:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" } ], "source": { "advisory": "GHSA-xm9f-vxmx-4m58", "discovery": "UNKNOWN" }, "title": "Data Flow Sanitation Issue Fix ", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32759", "STATE": "PUBLIC", "TITLE": "Data Flow Sanitation Issue Fix " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.15" }, { "version_value": "\u003e= 20, \u003c 20.0.13" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15" }, { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13" } ] }, "source": { "advisory": "GHSA-xm9f-vxmx-4m58", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32759", "datePublished": "2021-08-27T22:00:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26252
Vulnerability from cvelistv5
Published
2021-01-20 21:55
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.6, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to update product data to be able to store an executable file on the server and load it via layout xml. The latest OpenMage Versions up from 19.4.10 and 20.0.6 have this issue solved.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-99m6-r53j-4hh2 | x_refsource_CONFIRM | |
https://github.com/OpenMage/magento-lts/commit/0786aa48bc7b618cfe37b59f45e1da3714c533c3 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.10 Version: >= 20, < 20.0.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:03.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-99m6-r53j-4hh2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/0786aa48bc7b618cfe37b59f45e1da3714c533c3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.10" }, { "status": "affected", "version": "\u003e= 20, \u003c 20.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.6, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to update product data to be able to store an executable file on the server and load it via layout xml. The latest OpenMage Versions up from 19.4.10 and 20.0.6 have this issue solved." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-20T21:55:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-99m6-r53j-4hh2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/0786aa48bc7b618cfe37b59f45e1da3714c533c3" } ], "source": { "advisory": "GHSA-99m6-r53j-4hh2", "discovery": "UNKNOWN" }, "title": "Layout XML RCE Vulnerability in OpenMage", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26252", "STATE": "PUBLIC", "TITLE": "Layout XML RCE Vulnerability in OpenMage" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.10" }, { "version_value": "\u003e= 20, \u003c 20.0.6" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.6, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to update product data to be able to store an executable file on the server and load it via layout xml. The latest OpenMage Versions up from 19.4.10 and 20.0.6 have this issue solved." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-99m6-r53j-4hh2", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-99m6-r53j-4hh2" }, { "name": "https://github.com/OpenMage/magento-lts/commit/0786aa48bc7b618cfe37b59f45e1da3714c533c3", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/commit/0786aa48bc7b618cfe37b59f45e1da3714c533c3" } ] }, "source": { "advisory": "GHSA-99m6-r53j-4hh2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26252", "datePublished": "2021-01-20T21:55:13", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:03.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15151
Vulnerability from cvelistv5
Published
2020-08-19 18:10
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
OpenMage LTS before versions 19.4.6 and 20.0.2 allows attackers to circumvent the `fromkey protection` in the Admin Interface and increases the attack surface for Cross Site Request Forgery attacks. This issue is related to Adobe's CVE-2020-9690. It is patched in versions 19.4.6 and 20.0.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6 | x_refsource_CONFIRM | |
https://helpx.adobe.com/security/products/magento/apsb20-47.html | x_refsource_MISC | |
https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: < 19.4.6" Version: >= 20.0.0, < 20.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb20-47.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c 19.4.6\"" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenMage LTS before versions 19.4.6 and 20.0.2 allows attackers to circumvent the `fromkey protection` in the Admin Interface and increases the attack surface for Cross Site Request Forgery attacks. This issue is related to Adobe\u0027s CVE-2020-9690. It is patched in versions 19.4.6 and 20.0.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "{\"CWE-203\":\"Observable Discrepancy\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-19T18:10:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/magento/apsb20-47.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a" } ], "source": { "advisory": "GHSA-crf2-xm6x-46p6", "discovery": "UNKNOWN" }, "title": "Observable Timing Discrepancy in OpenMage LTS", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15151", "STATE": "PUBLIC", "TITLE": "Observable Timing Discrepancy in OpenMage LTS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "magento-lts", "version": { "version_data": [ { "version_value": "\u003c 19.4.6\"" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.2" } ] } } ] }, "vendor_name": "OpenMage" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenMage LTS before versions 19.4.6 and 20.0.2 allows attackers to circumvent the `fromkey protection` in the Admin Interface and increases the attack surface for Cross Site Request Forgery attacks. This issue is related to Adobe\u0027s CVE-2020-9690. It is patched in versions 19.4.6 and 20.0.2." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-203\":\"Observable Discrepancy\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6", "refsource": "CONFIRM", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6" }, { "name": "https://helpx.adobe.com/security/products/magento/apsb20-47.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/magento/apsb20-47.html" }, { "name": "https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a", "refsource": "MISC", "url": "https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a" } ] }, "source": { "advisory": "GHSA-crf2-xm6x-46p6", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15151", "datePublished": "2020-08-19T18:10:13", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }