Описание
Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution on the underlying filesystem. Exploitation of this issue does not require user interaction, but the attack complexity is high.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:ext-6:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:ext-6:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*
cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*
cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*
EPSS
Процентиль: 84%
0.02201
Низкий
9 Critical
CVSS3
Дефекты
CWE-20
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 9
github
почти 2 года назад
Magento Open Source allows Improper Input Validation
CVSS3: 9
fstec
около 2 лет назад
Уязвимость программных платформ для разработки и управления онлайн магазинами Magento Open Source и Adobe Commerce, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 84%
0.02201
Низкий
9 Critical
CVSS3
Дефекты
CWE-20
NVD-CWE-noinfo