Adobe has recently released a critical security update for its Adobe Commerce and Magento Open Source platforms. The purpose of this blog post is to cover the specifics of this update, the possible risks it minimizes, and actionable steps users can take to strengthen their security posture.
The security update, identified as APSB24-73, was released on October 08, 2024. It addresses critical vulnerabilities present in Adobe Commerce and Magento Open Source. These vulnerabilities, if exploited, could lead to arbitrary code execution, arbitrary file system read, security feature bypass, and privilege escalation.
Affected Versions
The affected versions include various iterations of Adobe Commerce and Magento Open Source. Users of versions before the following are urged to take immediate action:
- Adobe Commerce: 2.4.7-p2 and earlier, 2.4.6-p7 and earlier, 2.4.5-p9 and earlier, 2.4.4-p10 and earlier, and more.
- Adobe Commerce B2B: 1.4.2-p2 and earlier, 1.3.5-p7 and earlier, 1.3.4-p9 and earlier, 1.3.3-p10 and earlier, and more.
- Magento Open Source: 2.4.7-p2 and earlier, 2.4.6-p7 and earlier, 2.4.5-p9 and earlier, 2.4.4-p10 and earlier, and more.
Solution
Adobe has provided updated versions for both Adobe Commerce and Magento Open Source to address these vulnerabilities. Adobe has categorized the updates with the priority ratings and users are strongly advised to update their installations to the newest versions as soon as possible. Detailed installation instructions are available on Adobe’s website.
Vulnerability Details
The vulnerabilities encompass various categories, including Improper Authentication (CWE-287), Cross-site Scripting (Stored XSS) (CWE-79), Improper Input Validation (CWE-20), Server-Side Request Forgery (SSRF) (CWE-918), Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367), Cross-site Scripting (Stored XSS) (CWE-79), Improper Access Control (CWE-284), Incorrect Authorization (CWE-863), Cross-site Scripting (Stored XSS) (CWE-79), Improper Authorization (CWE-285), Improper Access Control (CWE-284), Information Exposure (CWE-200). These vulnerabilities pose the risk of arbitrary code execution, arbitrary file system read, security feature bypass, and privilege escalation.
You can find detailed information here: Adobe Security Bulletin APSB24-73.