vendor:
Magento
by:
tmrswrr
8.1
CVSS
CRITICAL
Server Side Injection
91
CWE
Product Name: Magento
Affected Version From: 2.4.2006
Affected Version To: 2.4.2006
Patch Exists: NO
Related CWE: CVE-2023-XXXX (Not a real CVE, placeholder)
CPE: magento:2.4.6
Metasploit:
https://www.rapid7.com/db/vulnerabilities/suse-cve-2024-1597/, https://www.rapid7.com/db/vulnerabilities/mediawiki-cve-2024-23174/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-43358/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL9-unaffected/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-23504/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL8-unaffected/, https://www.rapid7.com/db/vulnerabilities/wordpress-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/red_hat-jboss_eap-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apache-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-9788/, https://www.rapid7.com/db/?q=placeholder)&type=&page=2, https://www.rapid7.com/db/?q=placeholder)&type=&page=2
Platforms Tested:
2023
Magento ver. 2.4.6 – XSLT Server Side Injection
The vulnerability allows an authenticated admin user to perform a server-side injection attack by exploiting the XSLT configuration feature. By crafting a malicious XSLT payload, the attacker can execute arbitrary commands on the server.
Mitigation:
To mitigate this vulnerability, restrict access to the admin panel to trusted users only and sanitize user inputs to prevent malicious XSLT payloads.