Magento Multiple Vulnerabilities Fixed by CE 1.9.3 and EE 1.14.3


Description   (#Several vulnerabilities were reported in Magento:#- APPSEC-1484: remote code execution. Through some payment methods, it might be possible to execute arbitrary PHP code during the checkout##- APPSEC-1480: SQL injection. A remote attacker could exploit it by sending crafted requests that include SQL statements in order to modify or delete entries in some database tables. This vulnerability is due to improper user-supplied input validation##- APPSEC-1488: stored cross-site scripting. A remote attacker could exploit it by enticing their victim into following a specially formed link in order to execute arbitrary JavaScript or HTML code##- APPSEC-1247: information disclosure. An attacker, with admin privileges, could exploit it by using blocks in order to extract sensitive information from the cache and also execute arbitrary code##- APPSEC-1517: security bypass on certain configurations. A remote attacker could logged in only by knowing their victim addresses##- APPSEC-1375: remote code execution. An attacker, with admin access or having access to the import/export feature, could exploit it in order to execute arbitrary code. This vulnerability is due to improper validation of unserialized data supplied from the Admin dashboard##- APPSEC-1338: cache poisoning##- APPSEC-1436: cross-site scripting in URL processing. A remote attacker could exploit it by enticing their victim into following a specially formed link in order to execute arbitrary JavaScript or HTML code. This vulnerability is due to improper user-supplied input validation##- APPSEC-1211: cross-site scripting in categories management. An attacker with admin access to the catalog management could exploit it via a specially crafted category name in order to execute arbitrary HTML or JavaScript code in other parts of the Admin panel##- APPSEC-1058: denial of service. A remote attacker could exploit it by uploading a specially crafted GIF image in order to cause web site to be unavailable##- APPSEC-666: cross-site scripting in FLASH file uploader##- APPSEC-1282: security bypass. An attacker could exploit it via specially crafted strings in order to bypass anti cross-site scripting filters in some Admin features##- APPSEC-327: cross-site request forgery in several forms. A remote attacker could exploit it by enticing his victim into opening a specially crafted link in order to execute arbitrary command, with victim's privileges, on the web site. This vulnerability is due to improper validation of key/tokens forms##- APPSEC-1189: cross-site request forgery. A remote attacker could exploit it by enticing his victim to open a specially crafted link in order to execute arbitrary command, with victim's privileges, on the web site##- APPSEC-1478: session does not expire on logout. An attacker with physical access to their victim machine could exploit it by getting their cookies sessions in order log in the web site##- APPSEC-1106: information disclosure. An attacker, in man in the middle position, could exploit it in order to obtain sensitive information. This vulnerability is due to improper validation of certain certificates##- APPSEC-995: timing attack on hash checking. An attacker could exploit it in order to guess the hash type using by the password checking functionality.)
     
Vulnerable Products   Vulnerable Software:
Magento (MAGENTO) - 1.14, 1.14.2.3, 1.9.1, 1.9.1.1, 1.9.2, ..., 2.0.7, 2.0.8, 2.0.9, 2.1, 2.1.1
     
Solution   Magento has also released versions 2.0.10 and 2.1.2 which fix these vulnerabilities.
     
CVE  
     
References   - Magento Security Center : SUPEE-8788 Security Update
https://magento.com/security/patches/supee-8788
- Magento Security Center : Magento 2.0.10 and 2.1.2 Security Update
https://magento.com/security/patches/magento-2010-and-212-security-update
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2016-10-11 

 Target Type 
Server 

 Possible exploit 
Remote