Vulnerability Description
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, and logs commands, effectively making them unusable. Version 1.5.3 contains patches for the problems.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scandipwa | Magento-Scripts | 1.5.1 |
Related Weaknesses (CWE)
References
- https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec28PatchThird Party Advisory
- https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwPatchThird Party Advisory
- https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec28PatchThird Party Advisory
- https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwPatchThird Party Advisory
FAQ
What is CVE-2021-32684?
CVE-2021-32684 is a vulnerability with a CVSS score of 6.2 (MEDIUM). magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the fun...
How severe is CVE-2021-32684?
CVE-2021-32684 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32684?
Check the references section above for vendor advisories and patch information. Affected products include: Scandipwa Magento-Scripts.