Miggo Logo

CVE-2019-8114:
Magento 2 Community Edition RCE Vulnerability

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.77987%
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer< 1.9.4.31.9.4.3
magento/community-editioncomposer>= 2.2.0, < 2.2.102.2.10
magento/community-editioncomposer>= 2.3.0, < 2.3.2-p22.3.2-p2
magento/project-community-editioncomposer< 1.9.4.31.9.4.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient validation during configuration archive uploads by authenticated admins. The primary entry point is the import functionality in the admin panel, which processes ZIP files. Mage_Adminhtml_System_ConfigController::importAction is directly responsible for handling these uploads, and historical Magento vulnerabilities (e.g., CVE-2019-8114) often involve improper file extraction in controllers. Mage_Dataflow_Model_Convert_Adapter_Io::save is implicated in file operations during imports; lack of validation here could allow malicious file writes. The high confidence for the controller action aligns with the CWE-434 pattern, while the dataflow adapter is a plausible secondary vector based on Magento's architecture.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r*mot* *o** *x**ution vuln*r**ility *xists in M***nto * prior to *.*.*.* *n* *.**.*.*, M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.* or *.*.*-p*. *n *ut**nti**t** us*r wit* **min privil***s to import ***tur*s **n *x**ut* *r*itr*ry *o** vi

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt v*li**tion *urin* *on*i*ur*tion *r**iv* uplo**s *y *ut**nti**t** **mins. T** prim*ry *ntry point is t** import *un*tion*lity in t** **min p*n*l, w*i** pro**ss*s ZIP *il*s. M***_**min*tml_Syst*m_*on*i**ontroll