Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability during the checkout process. An unauthenticated attacker can leverage this vulnerability to alter the price of items.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/magento/apsb21-64.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Sep 2021, 21:21
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://helpx.adobe.com/security/products/magento/apsb21-64.html - Patch, Vendor Advisory | |
CPE | cpe:2.3:a:adobe:adobe_commerce:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:magento_open_source:2.4.2:p1:*:*:*:*:*:* cpe:2.3:a:adobe:magento_open_source:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:adobe_commerce:2.4.2:p1:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
01 Sep 2021, 15:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-01 15:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-36030
Mitre link : CVE-2021-36030
CVE.ORG link : CVE-2021-36030
JSON object : View
Products Affected
adobe
- adobe_commerce
- magento_open_source
CWE
CWE-20
Improper Input Validation