File tree Expand file tree Collapse file tree 1 file changed +8
-1
lines changed
documentation/modules/exploit/multi/http Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Original file line number Diff line number Diff line change @@ -5,7 +5,14 @@ allows an unauthenticated user to gain arbitrary code execution through nested d
55upload.
66
77This vulnerability (CVE-2025 -54236, also known as SessionReaper) affects Magento 2.x instances using file-based session
8- storage. The module was specifically tested against Magento 2.4.4.
8+ storage. ** Note:** File-based session storage is not enabled by default in Magento. The target must be explicitly
9+ configured to use file-based sessions (typically via ` app/etc/env.php ` with ` 'session' => ['save' => 'files'] ` ) for this
10+ vulnerability to be exploitable. By default, Magento uses database or Redis session storage.
11+
12+ ** Exploit limitations:** In production environments, the upload directory (` media/customer_address/ ` ) where the malicious
13+ session file is uploaded is generally configured as read-only, which prevents successful exploitation. This exploit
14+ therefore has limited applicability in hardened production environments. The module was specifically tested against
15+ Magento 2.4.4.
916
1017### Description
1118
You can’t perform that action at this time.
0 commit comments