CVE-2024-20719 (GCVE-0-2024-20719)
Vulnerability from cvelistv5 – Published: 2024-02-15 13:39 – Updated: 2024-08-01 21:59
VLAI?
Summary
Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into every admin page. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field, that could be leveraged to gain admin access.
Severity ?
9.1 (Critical)
CWE
- CWE-79 - Cross-site Scripting (Stored XSS) (CWE-79)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Adobe | Adobe Commerce |
Affected:
0 , ≤ 2.4.4-p6
(semver)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "commerce",
"vendor": "adobe",
"versions": [
{
"lessThanOrEqual": "2.4.6-p3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.4.5-p5",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.4.4-p6",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.4.3-ext-5",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.4.2-ext-5",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.4.1-ext-5",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.4.0-ext-5",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.3.7-p4-ext-5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20719",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T05:00:29.231518Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-18T20:48:19.348Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:42.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://helpx.adobe.com/security/products/magento/apsb24-03.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Adobe Commerce",
"vendor": "Adobe",
"versions": [
{
"lessThanOrEqual": "2.4.4-p6",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-13T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into every admin page. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field, that could be leveraged to gain admin access. "
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"exploitCodeMaturity": "NOT_DEFINED",
"integrityImpact": "HIGH",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "LOW",
"modifiedAttackVector": "NETWORK",
"modifiedAvailabilityImpact": "HIGH",
"modifiedConfidentialityImpact": "HIGH",
"modifiedIntegrityImpact": "HIGH",
"modifiedPrivilegesRequired": "HIGH",
"modifiedScope": "NOT_DEFINED",
"modifiedUserInteraction": "NONE",
"privilegesRequired": "HIGH",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"scope": "CHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "Cross-site Scripting (Stored XSS) (CWE-79)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-15T13:39:38.538Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://helpx.adobe.com/security/products/magento/apsb24-03.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "[Adobe Commerce] Stored XSS from low privileged admin user on every admin page, bypassing CVE-2023-29297"
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2024-20719",
"datePublished": "2024-02-15T13:39:38.538Z",
"dateReserved": "2023-12-04T16:52:22.968Z",
"dateUpdated": "2024-08-01T21:59:42.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D258D9EF-94FB-41F0-A7A5-7F66FA7A0055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E5CF6F0-2388-4D3F-8FE1-43B8AF148564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFEBDDF2-6443-4482-83B2-3CD272CF599F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6661093F-8D22-450F-BC6C-A8894A52E6A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"2515DA6D-2E74-4A05-BD29-FEEF3322BCB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*\", \"matchCriteriaId\": \"69A1F1F7-E53C-40F3-B3D9-DC011FC353BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B07F7B2-E915-4EFF-8FFC-91143CEF082E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8605E4E6-0F7D-42C8-B35B-2349A0BEFC69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6318F97-E59A-4425-8DC7-045C78A644F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"324A573E-DBC8-42A0-8CB8-EDD8FBAB7115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"54151A00-CFB8-4E6A-8E74-497CB67BF7E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6086841-C175-46A1-8414-71C6163A0E7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A576B1B5-73A2-431E-998F-7E5458B51D6A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into every admin page. Malicious JavaScript may be executed in a victim\\u2019s browser when they browse to the page containing the vulnerable field, that could be leveraged to gain admin access. \"}, {\"lang\": \"es\", \"value\": \"Las versiones 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado que podr\\u00eda ser aprovechada por un atacante administrador para inyectar secuencias de comandos maliciosas en cada p\\u00e1gina administrada. Se puede ejecutar JavaScript malicioso en el navegador de la v\\u00edctima cuando navega a la p\\u00e1gina que contiene el campo vulnerable, que podr\\u00eda aprovecharse para obtener acceso de administrador.\"}]",
"id": "CVE-2024-20719",
"lastModified": "2024-11-21T08:53:00.843",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@adobe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}]}",
"published": "2024-02-15T14:15:46.077",
"references": "[{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb24-03.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/magento/apsb24-03.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"psirt@adobe.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-20719\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2024-02-15T14:15:46.077\",\"lastModified\":\"2024-11-21T08:53:00.843\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into every admin page. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field, that could be leveraged to gain admin access. \"},{\"lang\":\"es\",\"value\":\"Las versiones 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado que podr\u00eda ser aprovechada por un atacante administrador para inyectar secuencias de comandos maliciosas en cada p\u00e1gina administrada. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable, que podr\u00eda aprovecharse para obtener acceso de administrador.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D258D9EF-94FB-41F0-A7A5-7F66FA7A0055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5CF6F0-2388-4D3F-8FE1-43B8AF148564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEBDDF2-6443-4482-83B2-3CD272CF599F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6661093F-8D22-450F-BC6C-A8894A52E6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2515DA6D-2E74-4A05-BD29-FEEF3322BCB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A1F1F7-E53C-40F3-B3D9-DC011FC353BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B07F7B2-E915-4EFF-8FFC-91143CEF082E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8605E4E6-0F7D-42C8-B35B-2349A0BEFC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6318F97-E59A-4425-8DC7-045C78A644F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"324A573E-DBC8-42A0-8CB8-EDD8FBAB7115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"54151A00-CFB8-4E6A-8E74-497CB67BF7E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6086841-C175-46A1-8414-71C6163A0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A576B1B5-73A2-431E-998F-7E5458B51D6A\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb24-03.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb24-03.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb24-03.html\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:42.947Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20719\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-21T05:00:29.231518Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*\"], \"vendor\": \"adobe\", \"product\": \"commerce\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.6-p3\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.5-p5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.4-p6\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.3-ext-5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.2-ext-5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.1-ext-5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.0-ext-5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.3.7-p4-ext-5\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-18T20:46:27.868Z\"}}], \"cna\": {\"title\": \"[Adobe Commerce] Stored XSS from low privileged admin user on every admin page, bypassing CVE-2023-29297\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"modifiedScope\": \"NOT_DEFINED\", \"temporalScore\": 9.1, \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"remediationLevel\": \"NOT_DEFINED\", \"reportConfidence\": \"NOT_DEFINED\", \"temporalSeverity\": \"CRITICAL\", \"availabilityImpact\": \"HIGH\", \"environmentalScore\": 9.1, \"privilegesRequired\": \"HIGH\", \"exploitCodeMaturity\": \"NOT_DEFINED\", \"integrityRequirement\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NETWORK\", \"confidentialityImpact\": \"HIGH\", \"environmentalSeverity\": \"CRITICAL\", \"availabilityRequirement\": \"NOT_DEFINED\", \"modifiedIntegrityImpact\": \"HIGH\", \"modifiedUserInteraction\": \"NONE\", \"modifiedAttackComplexity\": \"LOW\", \"confidentialityRequirement\": \"NOT_DEFINED\", \"modifiedAvailabilityImpact\": \"HIGH\", \"modifiedPrivilegesRequired\": \"HIGH\", \"modifiedConfidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Adobe Commerce\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.4.4-p6\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2024-02-13T17:00:00.000Z\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb24-03.html\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin attacker to inject malicious scripts into every admin page. Malicious JavaScript may be executed in a victim\\u2019s browser when they browse to the page containing the vulnerable field, that could be leveraged to gain admin access. \"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"Cross-site Scripting (Stored XSS) (CWE-79)\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2024-02-15T13:39:38.538Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-20719\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:59:42.947Z\", \"dateReserved\": \"2023-12-04T16:52:22.968Z\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"datePublished\": \"2024-02-15T13:39:38.538Z\", \"assignerShortName\": \"adobe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…