Magento up to 2.1.17/2.2.8/2.3.1 Email Template information disclosure – Digitalmunition




Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 4th, 2019 📆 | 4203 Views ⚑

0

Magento up to 2.1.17/2.2.8/2.3.1 Email Template information disclosure

CVSS Meta Temp ScoreCurrent Exploit Price (≈)
3.4$0-$5k

A vulnerability was found in Magento up to 2.1.17/2.2.8/2.3.1. It has been classified as problematic. This affects some unknown processing of the component Email Template Handler. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-200. This is going to have an impact on confidentiality.

The weakness was published 08/02/2019. The advisory is shared at magento.com. This vulnerability is uniquely identified as CVE-2019-7888 since 02/12/2019. Neither technical details nor an exploit are publicly available.

Upgrading to version 2.1.18, 2.2.9 or 2.3.2 eliminates this vulnerability.

Similar entries are available at 139393, 139394, 139395 and 139399.

Name

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.4
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure (CWE-200)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Magento 2.1.18/2.2.9/2.3.2

02/12/2019 CVE assigned
08/02/2019 +171 days Advisory disclosed
08/04/2019 +2 days VulDB entry created
08/04/2019 +0 days VulDB last updateAdvisory: magento.com

CVE: CVE-2019-7888 (🔒)
See also: 🔒

Created: 08/04/2019 07:39 AM
Complete: 🔍

Comments

No comments yet. Please log in to comment.

See the underground prices here!

https://vuldb.com/?id.139425

Tagged with:



Leave a Reply