CVE-2019-8108:
Magento Broken authentication and session managememt
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30142%
CWE
Published
5/24/2022
Updated
5/15/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.2, < 2.2.10 | 2.2.10 |
magento/community-edition | composer | >= 2.3, < 2.3.2-p2 | 2.3.2-p2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description indicates authenticated users could manipulate session validation
settings. The most logical attack vector involves modifying system configuration
values governing session management. The Save
controller in Magento's configuration
system is responsible for persisting these settings. The vulnerability likely exists because this endpoint either lacked proper authorization checks for sensitive session-related configuration
options or allowed unauthorized scope modifications (e.g., store-view level changes by users without adequate permissions). This aligns with CWE-287
(Improper Authentication) as it relates to failure to properly verify privileges when modifying security controls.