Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Another Critical RCE Discovered in Adobe Commerce and Magento Platforms

Adobe Commerce and Magento Platforms

Adobe on Thursday updated its advisory for an actively exploited zero-day[1] affecting Adobe Commerce
and Magento Open Source to patch a newly discovered flaw that could
be weaponized to achieve arbitrary code execution.

Automatic GitHub Backups

Tracked as CVE-2022-24087[2], the issue – like
CVE-2022-24086 – is rated 9.8 on the CVSS vulnerability scoring
system and relates to an “Improper Input Validation[3]” bug that could result
in the execution of malicious code.

“We have discovered additional security protections necessary
for CVE-2022-24086 and have released an update to address them
(CVE-2022-24087),” the company said[4]
in a revised bulletin. “Adobe is not aware of any exploits in the
wild for the issue addressed in this update (CVE-2022-24087).”

Adobe Commerce and Magento Platforms

As before, Adobe Commerce and Magento Open Source versions
2.4.3-p1 and earlier and 2.3.7-p2 and earlier are impacted by
CVE-2022-24087, but it’s worth noting that versions 2.3.0 to 2.3.3
are not vulnerable.

“A new patch have [sic] been published for Magento 2, to
mitigate the pre-authenticated remote code execution,” security
researcher Blaklis[5], who is credited with
discovering the flaw alongside Eboda[6], tweeted. “If you
patched with the first patch, THIS IS NOT SUFFICIENT to be safe.
Please update again!”

Prevent Data Breaches

The patch arrives as cybersecurity firm Positive Technologies
disclosed[7]
it was able to successfully create an exploit for CVE-2022-24086 to
gain remote code execution from an unauthenticated user, making it
imperative that customers move quickly to apply the fixes to
prevent possible exploitation.

References

  1. ^
    actively
    exploited zero-day
    (thehackernews.com)
  2. ^
    CVE-2022-24087
    (helpx.adobe.com)
  3. ^
    Improper
    Input Validation
    (cwe.mitre.org)
  4. ^
    said
    (support.magento.com)
  5. ^
    Blaklis
    (twitter.com)
  6. ^
    Eboda
    (twitter.com)
  7. ^
    disclosed
    (twitter.com)

Read more