Magento Mass Importer < 0.7.23 Cross-Site Scripting

medium Web Application Scanning Plugin ID 112441
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

Magento Mass Importer < 0.7.23 Cross-Site Scripting

Description

Magento Mass Importer (Magmi) is a Magento database client used to perform raw bulk operations on the models of the online store. Magento Mass Importer versions before 0.7.23 suffer from a cross-site scripting vulnerability through the prefix parameter of the /magmi/web/ajax_gettime.php URL, allowing an attacker to inject HTML or javascript code in the context of the vulnerable application. The attacker could leverage this vulnerability to target Magento privileged users and to gain access to sensitive information or to perform modifications on behalf of this user.

Solution

Magento Mass Importer version 0.7.23 fixes the vulnerability but is still in development and has known issues. Therefore, it is recommended to remove the software.

See Also

https://github.com/dweeves/magmi-git/issues/522

https://www.documentcloud.org/documents/6893935-FBI-Flash-Alert-MU-000127-MW.html

Plugin Details

Severity: Medium

ID: 112441

Type: remote

Published: 6/11/2020

Updated: 9/7/2021

Scan Template: api, scan, pci

Risk Information

CVSS Score Source: CVE-2017-7391

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2017-7391