202 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

11 Sep 2023 — Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1. • https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 • CWE-330: Use of Insufficiently Random Values •

CVSS: 8.3EPSS: 0%CPEs: 10EXPL: 0

06 Sep 2023 — Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper access control vulnerability within Magento's Media Gallery Upload workflow. By storing a specially crafted file in the website gallery, an authenticated attacker with administrative privilege can gain access to delete the .htaccess file. This could result in the attacker achieving remote code execution. Las versiones 2.4.2 (y anteriores), 2.4.2-p1 (y anteriores) y 2.3.7 (y anteriores) de Magento... • https://helpx.adobe.com/security/products/magento/apsb21-64.html • CWE-284: Improper Access Control •

CVSS: 8.3EPSS: 0%CPEs: 10EXPL: 0

06 Sep 2023 — Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an Improper input validation vulnerability within the CMS page scheduled update feature. An authenticated attacker with administrative privilege could leverage this vulnerability to achieve remote code execution on the system. Las versiones 2.4.2 (y anteriores), 2.4.2-p1 (y anteriores) y 2.3.7 (y anteriores) de Magento están afectadas por una vulnerabilidad de validación de entrada Incorrecta dentro de la fu... • https://helpx.adobe.com/security/products/magento/apsb21-64.html • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 1%CPEs: 10EXPL: 0

06 Sep 2023 — Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the Widgets Update Layout. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution. Las versiones 2.4.2 (y anteriores), 2.4.2-p1 (y anteriores) y 2.3.7 (y anteriores) de Magento Commerce están afectadas por una vulnerabilidad de inyección XML en el diseño de actualización de widgets. Un atacante con privilegios de ad... • https://helpx.adobe.com/security/products/magento/apsb21-64.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

27 Jan 2023 — OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds. OpenMage LTS es una plataforma de comercio electrónico. • https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

27 Jan 2023 — OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue. OpenMage LTS es una plataforma de comercio electrónico. Antes de las versiones 19.4.22 y 20.0.19, un administrador con permisos para cargar archivos a través de DataFlow y crear productos podía ejecutar código arbitrario a... • https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

27 Jan 2023 — OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue. OpenMage LTS es una plataforma de comercio electrónico. Antes de las versiones 19.4.22 y 20.0.19, un bloque de diseño podía omitir la lista negra de bloques para ejecutar código remoto. • https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

27 Jan 2023 — OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue. OpenMage LTS es una plataforma de comercio electrónico. Antes de las versiones 19.4.22 y 20.0.19, los usuarios administradores de Magento con acceso a los medios del cliente podían ejecutar código en el servidor. • https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

27 Jan 2023 — OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue. OpenMage LTS es una plataforma de comercio electrónico. Antes de las versiones 19.4.22 y 20.0.19, el diseño personalizado permitía a los usuarios administradores ejecutar comandos arbitrarios mediante métodos de bloqueo. • https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

27 Jan 2023 — Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds. • https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4 • CWE-352: Cross-Site Request Forgery (CSRF) •