CVE-2022-24086 – Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability
https://notcve.org/view.php?id=CVE-2022-24086
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution. Adobe Commerce versiones 2.4.3-p1 (y anteriores) y 2.3.7-p2 (y anteriores), están afectadas por una vulnerabilidad de comprobación de entrada inapropiada durante el proceso de compra. Una explotación de este problema no requiere la interacción del usuario y podría resultar en una ejecución de código arbitrario Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution. • https://github.com/Mr-xn/CVE-2022-24086 https://github.com/oK0mo/CVE-2022-24086-RCE-PoC https://github.com/nanaao/CVE-2022-24086-RCE https://github.com/pescepilota/CVE-2022-24086 https://github.com/NHPT/CVE-2022-24086-RCE https://github.com/akr3ch/CVE-2022-24086 https://github.com/rxerium/CVE-2022-24086 https://github.com/BurpRoot/CVE-2022-24086 https://github.com/seymanurmutlu/CVE-2022-24086-CVE-2022-24087 https://helpx.adobe.com/security/products/magento/apsb2 • CWE-20: Improper Input Validation •
CVE-2021-32759 – Data Flow Sanitation Issue Fix
https://notcve.org/view.php?id=CVE-2021-32759
OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue. OpenMage magento-lts es una alternativa a las versiones oficiales de Magento CE. Debido a una falta de saneamiento en el flujo de datos en las versiones anteriores a 19.4.15 y 20.0.13, era posible que los usuarios administradores cargaran archivos ejecutables arbitrarios al servidor. • https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15 https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13 https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58 • CWE-20: Improper Input Validation •
CVE-2021-21427 – Backport for CVE-2021-21024 Blind SQLi from Magento 2
https://notcve.org/view.php?id=CVE-2021-21427
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in versions 19.4.13 and 20.0.9. Magento-lts es una alternativa de soporte a largo plazo a Magento Community Edition (CE). • https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-21426 – Fixes a bug in Zend Framework's Stream HTTP Wrapper
https://notcve.org/view.php?id=CVE-2021-21426
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework 3. The vulnerability was assigned CVE-2021-3007 in Zend Framework. Magento-lts es una alternativa de soporte a largo plazo a Magento Community Edition (CE). • https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c • CWE-502: Deserialization of Untrusted Data •
CVE-2020-15244 – RCE in Magento
https://notcve.org/view.php?id=CVE-2020-15244
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4. En Magento (paquete rubygems openmage/magento-lts) versiones anteriores a 19.4.8 y 20.0.4, un usuario administrador puede generar credenciales soap que pueden ser usadas para activar una RCE por medio de la inyección de objetos PHP mediante atributos de producto y un producto. El problema está parcheado en las versiones 19.4.8 y 20.0.4 • https://github.com/OpenMage/magento-lts https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-502: Deserialization of Untrusted Data •