CVE-2020-5777

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-5777
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-5777.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-5777
Aliases
Published
2020-09-01T21:15:12Z
Modified
2024-09-03T03:31:59.910289Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication.

References

Affected packages

Git / github.com/dweeves/magmi-git

Affected ranges

Type
GIT
Repo
https://github.com/dweeves/magmi-git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.7.19
0.7.19a
0.7.20
0.7.21
0.7.22