Magento Server-Side Request Forgery (SSRF)
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Feb 12, 2024
Package
Affected versions
>= 2.2.0, < 2.2.10
>= 2.3.0, < 2.3.2-p2
Patched versions
2.2.10
2.3.2-p2
Description
Published by the National Vulnerability Database
Nov 6, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jan 10, 2024
Last updated
Feb 12, 2024
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with admin privileges to manipulate shippment settings can execute arbitrary code through server-side request forgery due to unsafe handling of a carrier gateway.
As per the Magento Release 2.3.3, if you have already implemented the pre-release version of this patch (2.3.2-p1), it is highly recommended to promptly upgrade to 2.3.2-p2.
References