CVE-2023-22247

7.5 HIGH

📋 TL;DR

CVE-2023-22247 is an XML injection vulnerability in Adobe Commerce that allows unauthenticated attackers to read arbitrary files from the server. This affects Adobe Commerce versions 2.4.4-p2 and earlier, and 2.4.5-p1 and earlier. No user interaction is required for exploitation.

💻 Affected Systems

Products:
  • Adobe Commerce
  • Magento Open Source
Versions: 2.4.4-p2 and earlier, 2.4.5-p1 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Adobe Commerce and Magento Open Source. All installations within affected version ranges are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server file system compromise leading to sensitive data exposure, configuration file access, and potential credential theft.

🟠

Likely Case

Unauthorized reading of sensitive files including configuration files, logs, and potentially customer data.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation preventing access to critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward for attackers with basic XML injection knowledge. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.4-p3, 2.4.5-p2, 2.4.6

Vendor Advisory: https://helpx.adobe.com/security/products/magento/apsb23-17.html

Restart Required: Yes

Instructions:

1. Backup your Adobe Commerce instance. 2. Update to version 2.4.4-p3, 2.4.5-p2, or 2.4.6. 3. Clear cache. 4. Restart services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for XML parsing functions to reject malicious payloads.

Implement custom validation in XML parsing modules

Web Application Firewall

all

Deploy WAF with XML injection protection rules to block malicious requests.

Configure WAF to detect and block XML injection patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to Adobe Commerce instances
  • Apply strict file system permissions to limit readable files to minimum required

🔍 How to Verify

Check if Vulnerable:

Check Adobe Commerce version via admin panel or by examining composer.json version.

Check Version:

php bin/magento --version

Verify Fix Applied:

Verify version is 2.4.4-p3, 2.4.5-p2, or 2.4.6 or later. Test XML parsing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • Requests with XML payloads containing file paths
  • Multiple failed file read attempts

Network Indicators:

  • HTTP requests with XML payloads targeting vulnerable endpoints
  • Unusual outbound file transfer patterns

SIEM Query:

source="web_logs" AND (uri="*/xml*" OR method="POST") AND (payload="*file:*" OR payload="*path:*")

🔗 References

📤 Share & Export