CVE-2022-24087
Magento Open Source vulnerability analysis and mitigation

Overview

Adobe Commerce and Magento Open Source platforms were affected by a critical vulnerability identified as CVE-2022-24087, discovered in February 2022. This vulnerability was related to an 'Improper Input Validation' issue that could result in arbitrary code execution. The vulnerability affected Adobe Commerce and Magento Open Source versions 2.4.3-p1 and earlier, as well as 2.3.7-p2 and earlier, though versions 2.3.0 to 2.3.3 were not vulnerable (Hacker News, Sansec).

Technical details

The vulnerability received a Critical CVSS score of 9.8, indicating its severe nature. It was discovered as an additional security protection necessary following the earlier CVE-2022-24086 vulnerability. The issue was related to improper input validation that could lead to remote code execution (RCE) in the affected systems (Hacker News).

Impact

If successfully exploited, the vulnerability could lead to arbitrary code execution on affected systems. The severity of the impact was particularly concerning as it allowed for unauthenticated remote code execution, which is considered one of the most serious types of vulnerabilities (Sansec).

Mitigation and workarounds

Adobe released emergency patches to address the vulnerability. Users were required to apply two patches in sequence: MDVA-43395 followed by MDVA-43443. For cloud infrastructure users, the issue was resolved in Cloud Patches package v1.0.16. Adobe strongly recommended that customers upgrade to the latest Cloud Patches package after uninstalling any custom patches related to APSB22-12 (Adobe Support).

Community reactions

Security researchers and industry experts emphasized the critical nature of the vulnerability. Researcher Blaklis, who discovered the flaw alongside Eboda, warned users that the first patch alone was insufficient and urged immediate application of both patches (Hacker News).

Additional resources


SourceThis report was generated using AI

Related Magento Open Source vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-34102CRITICAL9.8
  • PHPPHP
  • composer://magento/product-community-edition
YesYesJun 13, 2024
CVE-2024-20758CRITICAL9
  • PHPPHP
  • magento/project-community-edition
NoYesApr 10, 2024
CVE-2024-20759HIGH8.1
  • PHPPHP
  • magento/community-edition
NoYesApr 10, 2024
CVE-2023-38250MEDIUM6.6
  • PHPPHP
  • magento/community-edition
NoYesOct 13, 2023
CVE-2023-38251MEDIUM5.3
  • PHPPHP
  • magento/product-enterprise-edition
NoYesOct 13, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management