CVE-2020-24407

9.1 CRITICAL

📋 TL;DR

This CVE describes an unsafe file upload vulnerability in Magento that allows authenticated administrators to upload malicious files, potentially leading to arbitrary code execution. The vulnerability affects Magento 2.4.0, 2.3.5p1, and earlier versions. Attackers with administrative access to specific components can exploit this to compromise the server.

💻 Affected Systems

Products:
  • Magento Commerce
  • Magento Open Source
Versions: 2.4.0, 2.3.5p1 and earlier
Operating Systems: All platforms running affected Magento versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrative access to System/Data and Transfer/Import components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise with complete administrative control, data theft, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized file upload leading to web shell installation and limited code execution within the Magento application context.

🟢

If Mitigated

Limited impact with proper file upload validation and restricted administrative access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.1 and 2.3.6

Vendor Advisory: https://helpx.adobe.com/security/products/magento/apsb20-59.html

Restart Required: No

Instructions:

1. Backup your Magento installation and database. 2. Update to Magento 2.4.1 or 2.3.6 via Composer or Magento Marketplace. 3. Clear cache and recompile if necessary. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit access to System/Data and Transfer/Import components to only essential administrators.

Implement File Upload Restrictions

all

Configure web server or application-level restrictions on file uploads in affected components.

🧯 If You Can't Patch

  • Implement strict access controls and monitor administrative user activity.
  • Deploy web application firewall rules to block suspicious file upload patterns.

🔍 How to Verify

Check if Vulnerable:

Check Magento version via admin panel or by examining app/etc/env.php for version information.

Check Version:

php bin/magento --version

Verify Fix Applied:

Confirm Magento version is 2.4.1 or higher, or 2.3.6 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to import/data directories
  • Administrative user performing unexpected import operations

Network Indicators:

  • HTTP POST requests to import/data endpoints with file uploads

SIEM Query:

source="magento_access.log" AND (uri_path="/admin/*/import" OR uri_path="/admin/*/data") AND method="POST" AND status=200

🔗 References

📤 Share & Export