SynopsisThe remote web server is running an outdated instance of Magento Community Edition (CE) that is affected by multiple attack vectors.
DescriptionVersions of Magento CE prior to 184.108.40.206 are affected by multiple vulnerabilities :
- A flaw exists in the 'catalogProductCreate' implementation in the 'V2.php' script that is triggered as input passed via the 'productData' parameter is not properly sanitized. This may allow an authenticated remote attacker to execute arbitrary code.
- A flaw exists that allows a cross-site scripting (XSS) attack. This flaw exists because the Gift Registry search does not validate input when handling the 'search' parameter before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists related to request handling between a user and a server, where the server can be induced into performing unintended actions (Server Side Request Forgery, or SSRF). By making a crafted request, the server can be used to conduct host-based attacks. This may allow an attacker to bypass access restrictions (e.g. host or network ACLs), conduct port scanning of internal networks, enumerate internal hosts, or possibly invoke additional protocols (e.g. Gopher, TFTP) which may give additional control over such requests.
SolutionUpgrade to Magento CE version 220.127.116.11 or later.