Nginx remediation for vulnerability CVE-2025-54236#40744
Nginx remediation for vulnerability CVE-2025-54236#40744lfluvisotto wants to merge 1 commit intomagento:2.4-developfrom
Conversation
|
Hi @lfluvisotto. Thank you for your contribution!
Allowed build names are:
You can find more information about the builds here For more details, review the Code Contributions documentation. |
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
5 similar comments
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
|
@magento run all tests |
|
@magento create issue |
|
The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com. |
|
@engcom-Charlie follow-up |
Description (*)
This pull request introduces an additional security mitigation related to CVE-2025-54236.
It was identified that the /media/customer_address/ directory may be publicly accessible, which could expose sensitive files and increase the risk of exploitation.
To reduce the attack surface, this change recommends restricting direct access to this directory at the web server level by adding the following configuration to nginx.conf
This mitigation provides a defense-in-depth layer and helps prevent unauthorized access to sensitive resources. It does not replace applying official security patches but complements them.
Related Pull Requests
N/A
Fixed Issues (if relevant)
https://sansec.io/research/sessionreaper
Manual testing scenarios (*)
Apply the Nginx configuration.
Reload or restart Nginx.
Attempt to access a file inside /media/customer_address/ via a browser or HTTP request.
Verify that access is denied.
Questions or comments
This change is intended as a security hardening measure.
Contribution checklist (*)
Resolved issues: