CVE-2019-8151: Magento Server-Side Request Forgery (SSRF)
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.77108%
CWE
Published
5/24/2022
Updated
2/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.2.0, < 2.2.10 | 2.2.10 |
magento/community-edition | composer | >= 2.3.0, < 2.3.2-p2 | 2.3.2-p2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper validation of user-supplied URLs in carrier gateway configurations. Admin users could inject malicious URLs into shipping settings, which are then processed by functions responsible for communicating with external carriers. Functions like _getCachedQuotes (general carrier logic) and _doShipmentRequest (USPS-specific implementation) are critical points where unvalidated URLs would be used for server-side requests. These patterns align with the SSRF-to-RCE mechanism described in CVE-2019-8151, and the file paths correspond to Magento's core shipping module structure.