CVE-2019-8114:
Magento 2 Community Edition RCE Vulnerability
7.2
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | < 1.9.4.3 | 1.9.4.3 |
magento/community-edition | composer | >= 2.2.0, < 2.2.10 | 2.2.10 |
magento/community-edition | composer | >= 2.3.0, < 2.3.2-p2 | 2.3.2-p2 |
magento/project-community-edition | composer | < 1.9.4.3 | 1.9.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient validation during configuration archive uploads by authenticated admins. The primary entry point is the import functionality in the admin panel, which processes ZIP files. Mage_Adminhtml_System_ConfigController::importAction is directly responsible for handling these uploads, and historical Magento vulnerabilities (e.g., CVE-2019-8114) often involve improper file extraction in controllers. Mage_Dataflow_Model_Convert_Adapter_Io::save is implicated in file operations during imports; lack of validation here could allow malicious file writes. The high confidence for the controller action aligns with the CWE-434 pattern, while the dataflow adapter is a plausible secondary vector based on Magento's architecture.