CVE-2022-24086
PHP vulnerability analysis and mitigation

Overview

Adobe Commerce (formerly known as Magento) versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) were affected by an improper input validation vulnerability (CVE-2022-24086) discovered in early 2022. The vulnerability was identified during the checkout process and required no user interaction for exploitation. Adobe acknowledged that this vulnerability had been actively exploited in the wild (Adobe Bulletin, NVD).

Technical details

The vulnerability stems from unsafe string interpolation in the templating engine of Adobe Commerce. The exploit leverages two key functions exposed to the templating engine - getTemplateFilter and addAfterFilterCallback. These functions allow attackers to obtain a reference to a 'filter' object and attach arbitrary PHP functions to it, ultimately enabling remote code execution. The vulnerability can be exploited through multiple vectors, including the checkout process and the 'Wishlist' module (Watchtowr Labs).

Impact

The vulnerability allows unauthenticated remote code execution (RCE), which is considered the most severe type of vulnerability. Its impact is comparable to the Magento Shoplift vulnerability from 2015, which led to widespread compromises of unpatched stores. The vulnerability particularly affects e-commerce platforms, potentially exposing sensitive customer and payment data (Sansec Research).

Mitigation and workarounds

Adobe released two emergency patches: MDVA-43395 (February 13th) and MDVA-43443 (February 17th). Both patches must be applied in order for complete protection. For versions between Magento 2.3.3 and 2.3.7, manual patch application is possible. Versions below 2.3.3 are not directly vulnerable but are recommended to implement the patches, particularly the code changes affecting vendor/magento/module-email/Model/Template/Filter.php (Sansec Research).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management