Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Magento Community Edition 2.x < 2.0.6 Multiple Vulnerabilities

Critical

Synopsis

The remote web server is running an outdated instance of Magento Community Edition (CE) that is affected by multiple attack vectors.

Description

Versions of Magento CE 2.x prior to 2.0.6 are affected by multiple vulnerabilities :

- An unspecified flaw exists in the REST and SOAP APIs that may allow a remote attacker to execute arbitrary PHP Code. No further details have been provided. (OSVDB 138657) - A flaw exists that is due to the program leaving the '/app/etc' directory writable. This may allow a remote attacker to execute arbitrary PHP code after perform an unauthorized reinstallation of the program. (OSVDB 138658) - A flaw exists in '/rest/default/V1/guest-carts/<guestCartId>/shipping-information' that is triggered by the insecure deserialization of Java objects during the handling of SOAP or REST calls. This may a remote attacker to make changes to arbitrary files, and subsequently to customer accounts. (OSVDB 138659) - A flaw exists that allows a reflected cross-site scripting (XSS) attack. This flaw exists because the Authorize.net Module does not validate input to multiple parameters before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 138660) - A flaw exists in the Quote API that may allow a remote attacker to gain access to private data of registers customers. (OSVDB 138661) - A flaw exists that is due to overly verbose unhandled exception error messages. This may allow a remote attacker to gain access to file path information. (OSVDB 138662)

Solution

Upgrade to Magento CE version 2.0.6 or later.