Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Magento Community/Entreprise Edition: seven vulnerabilities

July 2015 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can use several vulnerabilities of Magento
Community/Entreprise Edition.

Impacted products: Magento Enterprise Edition

Severity: 2/4

Creation date: 19/05/2015

DESCRIPTION OF THE VULNERABILITY

Several vulnerabilities were announced in Magento
Community/Entreprise Edition.

An attacker can call a module to obtain the URL of the
administrator login page, so an attacker can use it for brute
force attacks. [severity:2/4]

An attacker can bypass security features in the checkout process,
in order to obtain names, addresses, phones of other customers.
[severity:2/4]

An attacker can change the identifier of a page, in order to
obtain information of other customers. [severity:2/4]

An attacker can use a bad image URL to trigger an error containing
the installation path of the server. [severity:1/4]

An attacker can use a vulnerability to upload a spreadsheet with a
bad formula to execute code. [severity:2/4]

An attacker can trigger a Cross Site Scripting via Authorize.Net
Direct Post, in order to execute JavaScript code in the context of
the web site. [severity:2/4]

An attacker can create a malicious package, and then invite the
victim to install it on the server, in order to overwrite a file
on the system. [severity:2/4]

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Magento-Community-Entreprise-Edition-seven-vulnerabilities-16940


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts