#VU8463 Path traversal in Adobe Commerce (formerly Magento Commerce)


Vulnerability identifier: #VU8463

Vulnerability risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: N/A

CWE-ID: CWE-94

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Adobe Commerce (formerly Magento Commerce)
Web applications / E-Commerce systems

Vendor: Magento, Inc

Description
The vulnerability allows a remote authenticated attacker to view contents of arbitrary files on the system.

The vulnerability exists due to insufficient input validation in Magento functional tests. A remote administrator with limited privileges can delete arbitrary files or execute arbitray commands on vulnerable system.

Mitigation
Update to version 2.0.16 or 2.1.9.

Vulnerable software versions

Adobe Commerce (formerly Magento Commerce): 2.0.0 - 2.0.15, 2.1.0 - 2.1.8


External links
https://magento.com/security/patches/magento-2016-and-219-security-update (APPSEC-1851: Arbitrary file delete + Lack of input sanitization leading to Remote Code Execution)


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability