Bulletin ID
Security Updates Available for Magento | APSB20-02
|
Date Published |
Priority |
---|---|---|
APSB20-02 |
January 28, 2020 |
2 |
Summary
Magento has released updates for Magento Commerce and Open Source editions. These updates resolve critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution.
Affected Versions
Product |
Version |
Platform |
---|---|---|
Magento Commerce |
2.3.3 and earlier versions |
All |
Magento Open Source |
2.3.3 and earlier versions |
All |
Magento Commerce |
2.2.10 and earlier versions |
All |
Magento Open Source |
2.2.10 and earlier versions |
All |
Magento Enterprise Edition |
1.14.4.3 and earlier versions |
All |
Magento Community Edition |
1.9.4.3 and earlier versions |
All |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version.
Product |
Version |
Platform |
Priority Rating |
Availability |
---|---|---|---|---|
Magento Commerce |
2.3.4 |
All |
2 |
|
Magento Open Source |
2.3.4 |
All |
2 |
|
Magento Commerce |
2.2.11 |
All |
2 |
|
Magento Open Source |
2.2.11 |
All |
2 |
|
Magento Enterprise Edition |
1.14.4.4 |
All |
2 |
|
Magento Community Edition |
1.9.4.4 |
All |
2 |
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
Magento Bug ID |
CVE Numbers |
---|---|---|---|---|
Stored cross-site scripting |
Sensitive information disclosure |
Important |
PRODSECBUG-2543 |
CVE-2020-3715 |
Stored cross-site scripting |
Sensitive information disclosure |
Important |
PRODSECBUG-2599 |
CVE-2020-3758 |
Deserialization of untrusted data |
Arbitrary code execution |
Critical |
PRODSECBUG-2579 |
CVE-2020-3716 |
Path traversal |
Sensitive information disclosure |
Important |
PRODSECBUG-2632 |
CVE-2020-3717 |
Security bypass |
Arbitrary code execution |
Critical |
PRODSECBUG-2633 |
CVE-2020-3718 |
SQL injection |
Sensitive information disclosure |
Critical |
PRODSECBUG-2660 |
CVE-2020-3719 |
Acknowledgments
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
· Ernesto Martin (CVE-2020-3715)
· Blaklis (CVE-2020-3716, CVE-2020-3717, CVE-2020-3718)
· Luke Rodgers (CVE-2020-3719)
· Djordje Marjanovic (CVE-2020-3758)