Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 4th, 2019 📆 | 4873 Views ⚑

0

Magento up to 2.1.17/2.2.8/2.3.1 Elastic Search Config Remote Code Execution


https://www.ispeech.org

CVSS Meta Temp Score Current Exploit Price (β‰ˆ)
6.0 $0-$5k

A vulnerability, which was classified as critical, was found in Magento up to 2.1.17/2.2.8/2.3.1. Affected is an unknown part of the component Elastic Search. The manipulation as part of a Config leads to a privilege escalation vulnerability (Code Execution). CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was disclosed 08/02/2019. The advisory is available at magento.com. This vulnerability is traded as CVE-2019-7885 since 02/12/2019. It is possible to launch the attack remotely. A single authentication is required for exploitation. The technical details are unknown and an exploit is not available.

Upgrading to version 2.1.18, 2.2.9 or 2.3.2 eliminates this vulnerability.

The entries 139403, 139404, 139412 and 139413 are pretty similar.

Name

VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0

VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: πŸ”’
VulDB Reliability: πŸ”

AV AC Au C I A
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock


VulDB Base Score: πŸ”’
VulDB Temp Score: πŸ”’
VulDB Reliability: πŸ”
Class: Privilege escalation / Code Execution (CWE-269)
Local: No
Remote: Yes

Availability: πŸ”’
Status: Not defined

Price Prediction: πŸ”
Current Price Estimation: πŸ”’


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: πŸ”
Adversaries: πŸ”
Geopolitics: πŸ”
Economy: πŸ”
Predictions: πŸ”
Remediation: πŸ”Recommended: Upgrade
Status: πŸ”

0-Day Time: πŸ”’

Upgrade: Magento 2.1.18/2.2.9/2.3.2

02/12/2019 CVE assigned
08/02/2019 +171 days Advisory disclosed
08/04/2019 +2 days VulDB entry created
08/04/2019 +0 days VulDB last updateAdvisory: magento.com

CVE: CVE-2019-7885 (πŸ”’)
See also: πŸ”’

Created: 08/04/2019 07:38 AM
Complete: πŸ”

Comments

No comments yet. Please log in to comment.

Download the whitepaper to learn more about our service!

https://vuldb.com/?id.139422

Tagged with: β€’ β€’ β€’ β€’ β€’



Comments are closed.