OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vpv-xmcj-9q85 | third party advisory |
https://github.com/OpenMage/magento-lts/commit/45330ff50439984e806992fa22c3f96c4d660f91 | third party advisory patch |
https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 | third party advisory release notes |
https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 | third party advisory release notes |