Multiple vulnerabilities in magento-lts



Published: 2023-01-26
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2023-23617
CVE-2021-41144
CVE-2021-39217
CVE-2021-21395
CWE-ID CWE-835
CWE-94
CWE-78
CWE-352
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
magento-lts
Web applications / Modules and components for CMS

Vendor OPENMAGE

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Infinite loop

EUVDB-ID: #VU71576

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-23617

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the malicious code filter. A remote attacker can consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

magento-lts: 19.4.0 - 20.0.18

External links

http://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m
http://github.com/OpenMage/magento-lts/releases/tag/v20.0.19
http://github.com/OpenMage/magento-lts/releases/tag/v19.4.22


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Code Injection

EUVDB-ID: #VU71574

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41144

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation within layout block. A remote user can bypass the block blacklist and execute arbitrary code on the target system.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

magento-lts: 19.4.0 - 20.0.18

External links

http://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm
http://github.com/OpenMage/magento-lts/releases/tag/v20.0.19
http://github.com/OpenMage/magento-lts/releases/tag/v19.4.22


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) OS Command Injection

EUVDB-ID: #VU71573

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39217

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in Custom Layout. A remote administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system via block methods.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

magento-lts: 19.4.0 - 20.0.18

External links

http://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7
http://github.com/OpenMage/magento-lts/releases/tag/v20.0.19
http://github.com/OpenMage/magento-lts/releases/tag/v19.4.22


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Cross-site request forgery

EUVDB-ID: #VU71571

Risk: Medium

CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-21395

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin within the password reset functionality. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

magento-lts: 19.4.0 - 20.0.18

External links

http://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4
http://github.com/OpenMage/magento-lts/releases/tag/v20.0.19
http://github.com/OpenMage/magento-lts/releases/tag/v19.4.22


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###