Magento Community Edition < 1.9.2.2 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9678

Synopsis

The remote web server is running an outdated instance of Magento Community Edition (CE) that is affected by multiple attack vectors.

Description

Versions of Magento CE prior to 1.9.2.2 are affected by multiple vulnerabilities :

- A flaw exists that is due to the program generating overly verbose error messages during the installation process or during a failed extension installation. This may allow a remote attacker to potentially gain access to configuration and database access credentials.
- A flaw exists in the external use of the email template 'filter functionality by extensions' that is triggered when a remote attacker uses them to call certain blocks. This may expose customer information, such as last orders or integration passwords.
- A flaw exists that may potentially allow carrying out an SQL injection attack. The issue is due to the 'addFieldtoFilter' method not properly sanitizing user-supplied input before using it in SQL queries. This may allow a remote attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
- An unspecified flaw exists in the 'Cron.php' script that may allow a remote attacker to inject arbitrary commands. No further details have been provided.
- A flaw exists that is due to the program failing to clear custom option values when the custom option type is switched. This may allow a remote attacker to execute arbitrary code.
- A flaw exists that allows a reflected cross-site scripting (XSS) attack. This flaw exists because the store front page does not validate input to error messages before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists that may potentially allow a remote attacker to leverage error report files to execute arbitrary code. No further details have been provided.
- A flaw exists that may allow a remote attacker to display the admin panel regardless of its URL by calling a module directly. This may allow the attacker to more easily conduct an automated brute-force attack.
- A flaw exists due to sensitive information being included as part of the URL in GET requests. This may in turn be disclosed to external sites via the 'Referer' header and allow a context-dependent attacker to gain knowledge of the password reset token.
- A flaw exists that is due to the program failing to cancel the token to reset passwords after it has been used. This may allow a remote attacker to more easily reuse the token if they gain knowledge of it.
- A flaw exists in the Dev Folder that is due to a missing '.htaccess' file, which would normally restrict browser access. This may allow a remote attacker to gain access to potentially sensitive information via a direct request.
- A flaw exists that allows a stored XSS attack. This flaw exists because the program does not validate input when handling host headers before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Solution

Upgrade to Magento CE version 1.9.2.2 or later.

See Also

http://magento.com/security/patches/supee-6788

Plugin Details

Severity: High

ID: 9678

Family: CGI

Published: 10/14/2016

Updated: 3/6/2019

Vulnerability Information

CPE: cpe:/a:magento:magento

Patch Publication Date: 10/28/2015

Vulnerability Publication Date: 10/28/2015