

Rewterz Threat Advisory – Multiple Adobe Connect Vulnerabilities
August 11, 2021
Rewterz Threat Advisory –CVE-2021-33698 – SAP Business One Security Vulnerability
August 11, 2021
Rewterz Threat Advisory – Multiple Adobe Connect Vulnerabilities
August 11, 2021
Rewterz Threat Advisory –CVE-2021-33698 – SAP Business One Security Vulnerability
August 11, 2021Severity
High
Analysis Summary
CVE-2021-36038
Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to bypass security restrictions, caused by the improper validation of input. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to bypass the security feature.
CVE-2021-36030
Adobe Magento Commerce and Open Source editions could allow a remote attacker to bypass security restrictions, caused by the improper validation of input. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to bypass the security feature.
CVE-2021-36032
Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to gain elevated privileges on the system. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim or cause the application to crash.
CVE-2021-36044
Adobe Magento Commerce and Open Source editions are vulnerable to a denial of service, caused by improper input validation. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2021-36037
Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to bypass security restrictions, caused by improper authorization. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to bypass the security feature.
CVE-2021-36029
Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to bypass security restrictions, caused by the improper validation of input. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to bypass the security feature.
CVE-2021-36027 ; CVE-2021-36026
Adobe Magento Commerce and Open Source editions are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2021-36033 ; CVE-2021-36028 ;
Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an XML Injection. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim or cause the application to crash.
CVE-2021-36040 ; CVE-2021-36041 ; CVE-2021-36035 ; CVE-2021-36034
Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to execute arbitrary code on the system, caused by improper validation of input. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim or cause the application to crash.
Impact
- Security Bypass
- Unauthorized Access
- Denial of Services
- Cross-Site Scripting
- Code Execution
- Credential Theft
Affected Vendors
Adobe
Affected Products
- Adobe Magento Commerce 2.4.2
- Adobe Magento Commerce 2.4.2-p1
- Adobe Magento Commerce 2.3.7
- Adobe Magento Open Source 2.4.2-p1
Remediation
Refer to Adobe Magento Commerce and Open Source for patch, upgrade or suggested workaround information
https://helpx.adobe.com/security/products/magento/apsb21-64.html