{"api_version":"1","generated_at":"2026-04-24T08:32:08+00:00","cve":"CVE-2021-36036","urls":{"html":"https://cve.report/CVE-2021-36036","api":"https://cve.report/api/cve/CVE-2021-36036.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-36036","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-36036"},"summary":{"title":"CVE-2021-36036","description":"Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper access control vulnerability within Magento's Media Gallery Upload workflow. By storing a specially crafted file in the website gallery, an authenticated attacker with administrative privilege can gain access to delete the .htaccess file. This could result in the attacker achieving remote code execution.","state":"PUBLIC","assigner":"psirt@adobe.com","published_at":"2023-09-06 14:15:00","updated_at":"2023-09-14 13:15:00"},"problem_types":["CWE-284"],"metrics":[],"references":[{"url":"https://helpx.adobe.com/security/products/magento/apsb21-64.html","name":"https://helpx.adobe.com/security/products/magento/apsb21-64.html","refsource":"MISC","tags":[],"title":"Adobe Security Bulletin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-36036","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-36036","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"commerce","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"open_source","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"2.3.7","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"commerce","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"2.3.7","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"open_source","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"2.4.2","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"commerce","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"2.4.2","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"open_source","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"2.4.2","cpe7":"p1","cpe8":"*","cpe9":"*","cpe10":"commerce","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36036","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"magento","cpe5":"magento","cpe6":"2.4.2","cpe7":"p1","cpe8":"*","cpe9":"*","cpe10":"open_source","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-36036","qid":"730180","title":"Magento Multiple Security Vulnerabilities (APSB21-64)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2021-36036","ASSIGNER":"psirt@adobe.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper access control vulnerability within Magento's Media Gallery Upload workflow. By storing a specially crafted file in the website gallery, an authenticated attacker with administrative privilege can gain access to delete the .htaccess file. This could result in the attacker achieving remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Access Control (CWE-284)","cweId":"CWE-284"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Adobe","product":{"product_data":[{"product_name":"Adobe Commerce","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThanOrEqual":"2.3.7","status":"affected","version":"0","versionType":"semver"}],"defaultStatus":"affected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://helpx.adobe.com/security/products/magento/apsb21-64.html","refsource":"MISC","name":"https://helpx.adobe.com/security/products/magento/apsb21-64.html"}]},"source":{"discovery":"EXTERNAL"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","availabilityRequirement":"NOT_DEFINED","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","confidentialityRequirement":"NOT_DEFINED","environmentalScore":7.2,"environmentalSeverity":"HIGH","exploitCodeMaturity":"NOT_DEFINED","integrityImpact":"HIGH","integrityRequirement":"NOT_DEFINED","modifiedAttackComplexity":"LOW","modifiedAttackVector":"NETWORK","modifiedAvailabilityImpact":"HIGH","modifiedConfidentialityImpact":"HIGH","modifiedIntegrityImpact":"HIGH","modifiedPrivilegesRequired":"HIGH","modifiedScope":"NOT_DEFINED","modifiedUserInteraction":"NONE","privilegesRequired":"HIGH","remediationLevel":"NOT_DEFINED","reportConfidence":"NOT_DEFINED","scope":"UNCHANGED","temporalScore":7.2,"temporalSeverity":"HIGH","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-06 14:15:00","lastModifiedDate":"2023-09-14 13:15:00","problem_types":["CWE-284"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*","versionEndExcluding":"2.3.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*","versionEndExcluding":"2.3.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:2.3.7:-:*:*:commerce:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:2.3.7:-:*:*:open_source:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:2.4.2:p1:*:*:commerce:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:2.4.2:p1:*:*:open_source:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:2.4.2:-:*:*:commerce:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:2.4.2:-:*:*:open_source:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*","versionStartIncluding":"2.4.0","versionEndExcluding":"2.4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*","versionStartIncluding":"2.4.0","versionEndExcluding":"2.4.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"36036","Ordinal":"211546","Title":"CVE-2021-36036","CVE":"CVE-2021-36036","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"36036","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}