CVE-2020-15244: Magento vulnerability

In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4.

How to mitigate CVE-2020-15244

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the Magento vulnerability that been reported in CVE-2020-15244.

  1. Install the latest version of Magento

    Navigate to the official Magento website and download the latest version of Magento. The latest version contains the CVE-2020-15244 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your Magento environment(s), and check for vulnerabilities. Verify if CVE-2020-15244 has been mitigated.

  3. Utilize the references

    The CVE-2020-15244 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26
  • github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26
  • github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b
  • github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b
  • Share this information