Adobe on Tuesday shipped security updates to remediate multiple critical vulnerabilities in its Magento e-commerce platform that could be abused by an attacker to execute arbitrary code and choose control of a susceptible process.
The issues have an affect on 2.3.7, 2.4.2-p1, 2.4.2, and before versions of Magento Commerce, and 2.3.7, 2.4.2-p1, and all prior versions of Magento Open Resource edition. Of the 26 flaws tackled, 20 are rated critical, and 6 are rated Critical in severity. None of the vulnerabilities fastened this thirty day period by Adobe are outlined as publicly regarded or beneath energetic attack at the time of launch.
The most regarding of the bugs are as follows –
- CVE-2021-36021, CVE-2021-36024, CVE-2021-36025, CVE-2021-36034, CVE-2021-36035, CVE-2021-36040, CVE-2021-36041, and CVE-2021-36042 (CVSS score: 9.1) – Arbitrary code execution owing to inappropriate input validation
- CVE-2021-36022 and CVE-2021-36023 (CVSS rating: 9.1) – Arbitrary code execution because of to OS command injection
- CVE-2021-36028 and CVE-2021-36033 (CVSS score: 9.1) – Arbitrary code execution because of to XML injection
- CVE-2021-36036 (CVSS score: 9.1) – Arbitrary code execution owing to improper entry handle
- CVE-2021-36029 (CVSS score: 9.1) – Security aspect bypass
- CVE-2021-36032 (CVSS score: 8.3) – Privilege escalation
- CVE-2021-36020 (CVSS score: 8.2) – Arbitrary code execution owing to XML injection
- CVE-2021-36043 (CVSS score: 8.) – Arbitrary code execution due to server-side request forgery (SSRF)
- CVE-2021-36044 (CVSS rating: 7.5) – Application denial-of-provider
- CVE-2021-36030 (CVSS score: 7.5) – Security attribute bypass
- CVE-2021-36031 (CVSS rating: 7.2) – Arbitrary code execution due to route traversal
Effective exploitation of the aforementioned pre-authentication vulnerabilities could be abused by an adversary to escalate privileges and run destructive code, consequently enabling the threat actor to seize control of a Magento site and its server.
People are remarkably recommended to move speedily to obtain the appropriate patches and set up them to mitigate the risks involved with the flaws.
Found this short article intriguing? Abide by THN on Fb, Twitter and LinkedIn to browse additional unique material we put up.
Some elements of this write-up are sourced from: