Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Magento Community Edition < 1.9.2.2 Multiple Vulnerabilities

High

Synopsis

The remote web server is running an outdated instance of Magento Community Edition (CE) that is affected by multiple attack vectors.

Description

Versions of Magento CE prior to 1.9.2.2 are affected by multiple vulnerabilities :

- A flaw exists that is due to the program generating overly verbose error messages during the installation process or during a failed extension installation. This may allow a remote attacker to potentially gain access to configuration and database access credentials. (OSVDB 129559) - A flaw exists in the external use of the email template 'filter functionality by extensions' that is triggered when a remote attacker uses them to call certain blocks. This may expose customer information, such as last orders or integration passwords. (OSVDB 129560) - A flaw exists that may potentially allow carrying out an SQL injection attack. The issue is due to the 'addFieldtoFilter' method not properly sanitizing user-supplied input before using it in SQL queries. This may allow a remote attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. (OSVDB 129561) - An unspecified flaw exists in the 'Cron.php' script that may allow a remote attacker to inject arbitrary commands. No further details have been provided. (OSVDB 129564) - A flaw exists that is due to the program failing to clear custom option values when the custom option type is switched. This may allow a remote attacker to execute arbitrary code. (OSVDB 129565) - A flaw exists that allows a reflected cross-site scripting (XSS) attack. This flaw exists because the store front page does not validate input to error messages before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 129566) - A flaw exists that may potentially allow a remote attacker to leverage error report files to execute arbitrary code. No further details have been provided. (OSVDB 129567) - A flaw exists that may allow a remote attacker to display the admin panel regardless of its URL by calling a module directly. This may allow the attacker to more easily conduct an automated brute-force attack. (OSVDB 129568) - A flaw exists due to sensitive information being included as part of the URL in GET requests. This may in turn be disclosed to external sites via the 'Referer' header and allow a context-dependent attacker to gain knowledge of the password reset token. (OSVDB 129569) - A flaw exists that is due to the program failing to cancel the token to reset passwords after it has been used. This may allow a remote attacker to more easily reuse the token if they gain knowledge of it. (OSVDB 129570) - A flaw exists in the Dev Folder that is due to a missing '.htaccess' file, which would normally restrict browser access. This may allow a remote attacker to gain access to potentially sensitive information via a direct request. (OSVDB 129571) - A flaw exists that allows a stored XSS attack. This flaw exists because the program does not validate input when handling host headers before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 129572)

Solution

Upgrade to Magento CE version 1.9.2.2 or later.