We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 236662c commit 5e693dcCopy full SHA for 5e693dc
documentation/modules/exploit/multi/http/magento_xxe_cve_2024_34102.md
@@ -2,7 +2,7 @@
2
3
### Description
4
5
-An authenticated user can read arbritraty file from Magento Community edition version 2.4.0 to 2.4.3.
+An unauthenticated user can read arbritraty file from Magento Community edition version 2.4.0 to 2.4.3.
6
The vulnerability is due to the lack of input validation in the XML file. An attacker can exploit this
7
vulnerability by sending a specially crafted XML file to the target server. The attacker can read any file on the server.
8
0 commit comments