Magento Connect Manager Bruteforced

high Web App Scanning Plugin ID 113118

Synopsis

Magento Connect Manager Bruteforced

Description

The scanner successfully authenticated on the Magento connect manager by using weak or predictable credentials.

Solution

The Magento connect manager interface should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account to prevent attackers from guessing it and gain unauthorized access.

See Also

https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html

https://en.wikipedia.org/wiki/Password_strength

https://magento.com/

https://magento.com/security/best-practices/5-immediate-actions-protect-against-brute-force-attacks

Plugin Details

Severity: High

ID: 113118

Type: remote

Published: 1/18/2022

Updated: 1/18/2022

Scan Template: pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

CVSS Score Source: Tenable

CVSS v4

Risk Factor: High

Base Score: 8.8

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information