Magento Multiple Vulnerabilities Fixed by 1.9.2


Description   (#Several vulnerabilities have been identified in Magento:#- information disclosure and privilege escalation. A remote attacker could exploit it in order to get customer information (order information, order IDs, customer name) and to possibly elevate its privileges. The vulnerability is due to improper check for authorized URL in the RSS component##- cross-site request forgery. A remote attacker could perform certain operations, such as the installation of a remote module that leads to the execution of remote code, by inciting a Magento store administrator into opening a malicious link. The vulnerability is located in Magento Connect Manager##- cross-site scripting. A remote attacker could exploit it in order to use the store to send spoofing or phishing emails by manipulating the customer name in a wishlist##- cross-site scripting. A remote attacker could exploit it in order to execute arbitrary JavaScript or HTML code by inciting their victim into following a specially formed link. The vulnerability is due to the non-validation of user input in the redirection link on an empty cart page##- path disclosure. A remote attacker could exploit it by directly accessing the URL of files related to Magento Connect in order to cause an exception that shows the server path##- information disclosure. A remote attacker, who is another user on the server, could exploit it in order to read or alter log files. The vulnerability is due to permissions on log files that are too broad##- cross-site scripting. A remote attacker with admin privileges could exploit it in order to execute arbitrary JavaScript or HTML code by manipulating the title of a Widget in the Magento Admin##- cross-site scripting. A remote attacker could exploit it in order to inject incorrect or malicious data into the New Orders RSS feed by manipulating the customer name##- information disclosure. A remote attacker could exploit it in order to force the Admin Login page to appear by directly calling a module, regardless of the URL##- information disclosure. A remote attacker could exploit it in order to obtain address information from the address books of other store customers, by entering a sequential ID during the checkout process. A proof of concept exists##- information disclosure. A remote attacker could exploit it in order to obtain address information, previous order and payment method from recurring payment profiles of other store customers, by entering a sequential ID while viewing its own recurring profile. A proof of concept exists##- path disclosure. A remote attacker could exploit it by using fictitious image URLs in order to cause an exception that shows the server path##- cross-site scripting. A remote attacker can exploit it in order to execute arbitrary JavaScript or HTML code, within the context of a Magento Connect Manager session, by inciting their victim into following a specially formed link##- formula injection. A remote attacker could exploit it in order to perform actions on the spreadsheet such as data exfiltration, by providing input that executes a formula when exported and opened in a spreadsheet application##- cross-site scripting. A remote attacker can exploit it in order to execute arbitrary JavaScript or HTML code by inciting a customer into following a specially formed link. This attack is performed using Authorize.Net Direct Post Module##- abuse of functionality. A remote attacker could exploit it in order to overwrite files on the server by publishing a malicious extension and enticing an user to install it##- shoplift bug: security bypass and SQL injection. A remote attacker could exploit it in order to execute Admin action and execute SQL commands.)
     
Vulnerable Products   Vulnerable Software:
MAGENTO (MAGENTO) - 1.9.1, 1.9.1.1
     
Solution   Fixed magento packages for FreeBSD are available.
     
CVE  
     
References   - Magento : Release Notes : Magento Community Edition 1.9.2
http://merch.docs.magento.com/ce/user_guide/magento/release-notes-ce-1.9.2.html
- Sucuri Blog : Magento Shoplift (SUPEE-5344) Exploits in the Wild
https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html
- VuXML : magento -- multiple vulnerabilities
http://www.vuxml.org/freebsd/ea1d2530-72ce-11e5-a2a1-002590263bf5.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2015-04-18 

 Target Type 
Server 

 Possible exploit 
Remote