Vulnerability Details : CVE-2019-8158
An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data.
Products affected by CVE-2019-8158
- cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*
- cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*
- cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*
- cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*
- cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*
- cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-8158
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-8158
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-8158
-
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-8158
-
https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update
Magento 2.3.3 and 2.2.10 Security Update | MagentoVendor Advisory
Jump to