CVE-2020-9664: Magento php object injection vulnerability
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.94572%
CWE
Published
5/24/2022
Updated
1/11/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/core | composer | <= 1.9.4.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure deserialization of user-controlled data, a common pattern in Magento's admin configuration handling. The CWE-502 (Deserialization of Untrusted Data) alignment and historical context of similar Magento vulnerabilities (e.g., SUPEE-5344) support this conclusion. The 'groups' parameter in the admin System Config controller is processed via unserialize(), which, when combined with the critical severity and remote exploitability described in the CVE, strongly indicates this as the vulnerable entry point. While CVSS metrics suggest no privileges are required, the Adobe advisory implies CSRF-like admin interaction, which aligns with the admin controller context.