Lucene search

K
nvd[email protected]NVD:CVE-2023-26366
HistoryOct 13, 2023 - 7:15 a.m.

CVE-2023-26366

2023-10-1307:15:38
CWE-918
web.nvd.nist.gov
1
adobe commerce
ssrf vulnerability
arbitrary file system read

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.5%

Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A high-privileged authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction, scope is changed due to the fact that an attacker can enforce file read outside the application’s path boundary.

Affected configurations

NVD
Node
adobecommerceMatch2.3.7-
OR
adobecommerceMatch2.3.7p1
OR
adobecommerceMatch2.3.7p2
OR
adobecommerceMatch2.3.7p3
OR
adobecommerceMatch2.3.7p4
OR
adobecommerceMatch2.3.7p4-ext1
OR
adobecommerceMatch2.3.7p4-ext2
OR
adobecommerceMatch2.3.7p4-ext3
OR
adobecommerceMatch2.3.7p4-ext4
OR
adobecommerceMatch2.4.0-
OR
adobecommerceMatch2.4.0ext-1
OR
adobecommerceMatch2.4.0ext-2
OR
adobecommerceMatch2.4.0ext-3
OR
adobecommerceMatch2.4.0ext-4
OR
adobecommerceMatch2.4.1-
OR
adobecommerceMatch2.4.1ext-1
OR
adobecommerceMatch2.4.1ext-2
OR
adobecommerceMatch2.4.1ext-3
OR
adobecommerceMatch2.4.1ext-4
OR
adobecommerceMatch2.4.2-
OR
adobecommerceMatch2.4.2ext-1
OR
adobecommerceMatch2.4.2ext-2
OR
adobecommerceMatch2.4.2ext-3
OR
adobecommerceMatch2.4.2ext-4
OR
adobecommerceMatch2.4.3-
OR
adobecommerceMatch2.4.3ext-1
OR
adobecommerceMatch2.4.3ext-2
OR
adobecommerceMatch2.4.3ext-3
OR
adobecommerceMatch2.4.3ext-4
OR
adobecommerceMatch2.4.4-
OR
adobecommerceMatch2.4.4p1
OR
adobecommerceMatch2.4.4p2
OR
adobecommerceMatch2.4.4p3
OR
adobecommerceMatch2.4.4p4
OR
adobecommerceMatch2.4.4p5
OR
adobecommerceMatch2.4.5-
OR
adobecommerceMatch2.4.5p1
OR
adobecommerceMatch2.4.5p2
OR
adobecommerceMatch2.4.5p3
OR
adobecommerceMatch2.4.5p4
OR
adobecommerceMatch2.4.5p5
OR
adobecommerceMatch2.4.6-
OR
adobecommerceMatch2.4.6p1
OR
adobecommerceMatch2.4.6p2
OR
adobecommerceMatch2.4.7b1
OR
adobemagentoMatch2.4.4-open_source
OR
adobemagentoMatch2.4.4p1open_source
OR
adobemagentoMatch2.4.4p2open_source
OR
adobemagentoMatch2.4.4p3open_source
OR
adobemagentoMatch2.4.5-open_source
OR
adobemagentoMatch2.4.5p1open_source
OR
adobemagentoMatch2.4.5p2open_source
OR
adobemagentoMatch2.4.5p3open_source
OR
adobemagentoMatch2.4.5p4open_source
OR
adobemagentoMatch2.4.6-open_source
OR
adobemagentoMatch2.4.6p1open_source
OR
adobemagentoMatch2.4.6p2open_source
OR
adobemagentoMatch2.4.7b1open_source

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.5%

Related for NVD:CVE-2023-26366