Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Magento Open Source Web applications / E-Commerce systems |
Vendor | Magento, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU18712
Risk: Medium
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to NGINX configuration's regular expressions not being restricted to the explicit directories. A remote administrator can upload PHP files to access sensitive data, because NGINX configuration allows PHP files to be executed in any directory.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMagento Open Source: 2.1.0 - 2.1.16
External linkshttp://magento.com/security/patches/magento-2.3.1-2.2.8-and-2.1.17-security-update
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.