CVE-2019-8230: Magento Remote code execution through support/output path modification
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.41037%
CWE
Published
5/24/2022
Updated
1/10/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/core | composer | < 1.9.4.3 | 1.9.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sanitization of the 'support/output' path configuration value. The primary entry point is the admin configuration save controller (ConfigController::saveAction), which processes user input. The lack of validation allows crafted paths to be stored via Mage_Core_Model_Config_Data::save. These paths are then likely used in file operations (e.g., log generation, template rendering) where PHP code execution occurs. While the exact code execution vector isn't visible without patch details, the high-privilege configuration handling functions are the logical points of failure for CWE-94.