Vulnerability Details : CVE-2021-32684
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, and logs commands, effectively making them unusable. Version 1.5.3 contains patches for the problems.
Products affected by CVE-2021-32684
- cpe:2.3:a:scandipwa:magento-scripts:1.5.1:*:*:*:*:node.js:*:*
- cpe:2.3:a:scandipwa:magento-scripts:1.5.2:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32684
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-32684
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | |
6.2
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.5
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2021-32684
-
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-32684
-
https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4
Missing Handler in @scandipwa/magento-scripts · Advisory · scandipwa/create-magento-app · GitHubPatch;Third Party Advisory
-
https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071
fixed exec and logs command throwing an error with docker.getContainers · scandipwa/create-magento-app@89115db · GitHubPatch;Third Party Advisory
Jump to