9.8

CVE-2019-8158

An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data.

Data is provided by the National Vulnerability Database (NVD)
MagentoMagento SwEditioncommerce Version >= 2.2.0 < 2.2.10
MagentoMagento SwEditionopen_source Version >= 2.2.0 < 2.2.10
MagentoMagento SwEditioncommerce Version >= 2.3.0 < 2.3.2
MagentoMagento SwEditionopen_source Version >= 2.3.0 < 2.3.2
MagentoMagento Version2.3.2 Update- SwEditioncommerce
MagentoMagento Version2.3.2 Update- SwEditionopen_source
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.19% 0.374
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-91 XML Injection (aka Blind XPath Injection)

The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.