CVE-2024-20758
10.04.2024, 12:15
Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution on the underlying filesystem. Exploitation of this issue does not require user interaction, but the attack complexity is high.Enginsight
Vendor | Product | Version |
---|---|---|
adobe | commerce | - |
adobe | commerce | 2.3.7 |
adobe | commerce | 2.3.7:p1 |
adobe | commerce | 2.3.7:p2 |
adobe | commerce | 2.3.7:p3 |
adobe | commerce | 2.3.7:p4 |
adobe | commerce | 2.3.7:p4-ext1 |
adobe | commerce | 2.3.7:p4-ext2 |
adobe | commerce | 2.3.7:p4-ext3 |
adobe | commerce | 2.3.7:p4-ext4 |
adobe | commerce | 2.4.0 |
adobe | commerce | 2.4.0:ext-1 |
adobe | commerce | 2.4.0:ext-2 |
adobe | commerce | 2.4.0:ext-3 |
adobe | commerce | 2.4.0:ext-4 |
adobe | commerce | 2.4.1 |
adobe | commerce | 2.4.1:ext-1 |
adobe | commerce | 2.4.1:ext-2 |
adobe | commerce | 2.4.1:ext-3 |
adobe | commerce | 2.4.1:ext-4 |
adobe | commerce | 2.4.2 |
adobe | commerce | 2.4.2:ext-1 |
adobe | commerce | 2.4.2:ext-2 |
adobe | commerce | 2.4.2:ext-3 |
adobe | commerce | 2.4.2:ext-4 |
adobe | commerce | 2.4.2:ext-6 |
adobe | commerce | 2.4.2:p1 |
adobe | commerce | 2.4.2:p2 |
adobe | commerce | 2.4.3 |
adobe | commerce | 2.4.3:ext-1 |
adobe | commerce | 2.4.3:ext-2 |
adobe | commerce | 2.4.3:ext-3 |
adobe | commerce | 2.4.3:ext-4 |
adobe | commerce | 2.4.3:ext-6 |
adobe | commerce | 2.4.3:p1 |
adobe | commerce | 2.4.3:p2 |
adobe | commerce | 2.4.4 |
adobe | commerce | 2.4.4:p1 |
adobe | commerce | 2.4.4:p2 |
adobe | commerce | 2.4.4:p3 |
adobe | commerce | 2.4.4:p4 |
adobe | commerce | 2.4.4:p5 |
adobe | commerce | 2.4.4:p6 |
adobe | commerce | 2.4.4:p7 |
adobe | commerce | 2.4.5 |
adobe | commerce | 2.4.5:p1 |
adobe | commerce | 2.4.5:p2 |
adobe | commerce | 2.4.5:p3 |
adobe | commerce | 2.4.5:p4 |
adobe | commerce | 2.4.5:p5 |
adobe | commerce | 2.4.5:p6 |
adobe | commerce | 2.4.6 |
adobe | commerce | 2.4.6:p1 |
adobe | commerce | 2.4.6:p2 |
adobe | commerce | 2.4.6:p3 |
adobe | commerce | 2.4.6:p4 |
adobe | commerce | 2.4.7 |
adobe | commerce | 2.4.7:b1 |
adobe | commerce | 2.4.7:b2 |
adobe | commerce | 2.4.7:beta3 |
adobe | magento | 2.4.4 |
adobe | magento | 2.4.4:p1 |
adobe | magento | 2.4.4:p2 |
adobe | magento | 2.4.4:p3 |
adobe | magento | 2.4.4:p4 |
adobe | magento | 2.4.4:p5 |
adobe | magento | 2.4.4:p6 |
adobe | magento | 2.4.4:p7 |
adobe | magento | 2.4.5 |
adobe | magento | 2.4.5:p1 |
adobe | magento | 2.4.5:p2 |
adobe | magento | 2.4.5:p3 |
adobe | magento | 2.4.5:p4 |
adobe | magento | 2.4.5:p5 |
adobe | magento | 2.4.5:p6 |
adobe | magento | 2.4.6 |
adobe | magento | 2.4.6:p1 |
adobe | magento | 2.4.6:p2 |
adobe | magento | 2.4.6:p3 |
adobe | magento | 2.4.6:p4 |
adobe | magento | 2.4.7 |
adobe | magento | 2.4.7:b1 |
adobe | magento | 2.4.7:b2 |
adobe | magento | 2.4.7:beta3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration