Adobe Commerce Vulnerable to Arbitrary Code Execution via XML External Entity Reference

CVE-2024-34102
9.8CRITICAL

Key Information

Vendor
Adobe
Status
Adobe Commerce
Vendor
Published:
13 June 2024

Badges

👾 Exploit Exists🙃 Public PoC📰 News Worthy

Summary

The vulnerability identified as CVE-2024-34102 affects Adobe Commerce and Magento Open Source, posing a serious security threat. The vulnerability allows attackers to read sensitive files containing passwords and execute remote code, potentially gaining full control over the affected e-commerce platform. This can lead to widespread attacks, with an estimated 75% of e-commerce websites being at risk. The slow adoption of software updates has been attributed to the introduction of security features such as Content Security Policy and Subresource Integrity in the new software versions, which can interfere with the normal operation of checkout processes. There is a warning that attackers may exploit this vulnerability in conjunction with another vulnerability, CVE-2024-2961, to cause significant harm. Despite a patch being released, there is still a risk of attackers accessing administrator APIs in environments where the iconv vulnerability has been patched.

Affected Version(s)

Adobe Commerce <= 2.4.4-p8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

4% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED

Timeline

  • 👾

    Exploit exists.

  • First article discovered by iThome

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database7 Proof of Concept(s)3 News Article(s)
.