Vulnerability CVE-2015-6497


Published: 2020-01-15

Description:
The create function in app/code/core/Mage/Catalog/Model/Product/Api/V2.php in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to index.php/api/v2_soap.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Magento <= 1.9.2 (catalogProductCreate) Autoloaded File Inclusion Vulnerability
Egidio Romano
15.09.2015

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html
http://karmainsecurity.com/KIS-2015-04
http://magento.com/security/patches/supee-6482
http://packetstormsecurity.com/files/133544/Magento-1.9.2-File-Inclusion.html
http://seclists.org/fulldisclosure/2015/Sep/48

Copyright 2024, cxsecurity.com

 

Back to Top