{ "schema_version": "1.4.0", "id": "GHSA-m496-x567-f98c", "modified": "2021-04-30T20:19:58Z", "published": "2021-04-22T16:10:49Z", "aliases": [ "CVE-2021-21426" ], "summary": "Fixes a bug in Zend Framework's Stream HTTP Wrapper", "details": "### Impact\nCVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007\n\nThis vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array.\n\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\nv20.0.9 v19.4.13", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "Packagist", "name": "openmage/magento-lts" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "19.4.13" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 19.4.12" } }, { "package": { "ecosystem": "Packagist", "name": "openmage/magento-lts" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "20.0.0" }, { "fixed": "20.0.9" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 20.0.8" } } ], "references": [ { "type": "WEB", "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21426" } ], "database_specific": { "cwe_ids": [ "CWE-502" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-04-21T20:16:53Z", "nvd_published_at": "2021-04-21T21:15:00Z" } }