Vulnerability Details : CVE-2021-41143
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
Vulnerability category: Directory traversalExecute code
Products affected by CVE-2021-41143
- cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*
- cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-41143
0.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-41143
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2021-41143
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2021-41143
-
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22
Release v19.4.22 · OpenMage/magento-lts · GitHubRelease Notes;Third Party Advisory
-
https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91
Merge pull request from GHSA-5vpv-xmcj-9q85 · OpenMage/magento-lts@45330ff · GitHubPatch;Third Party Advisory
-
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19
Release v20.0.19 · OpenMage/magento-lts · GitHubRelease Notes;Third Party Advisory
-
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85
Fix for arbitrary file deletion in customer media allows for remote code execution · Advisory · OpenMage/magento-lts · GitHubThird Party Advisory
Jump to