Vigil@nce - Magento Community/Entreprise Edition: seven vulnerabilities
July 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Magento
Community/Entreprise Edition.
Impacted products: Magento Enterprise Edition
Severity: 2/4
Creation date: 19/05/2015
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Magento
Community/Entreprise Edition.
An attacker can call a module to obtain the URL of the
administrator login page, so an attacker can use it for brute
force attacks. [severity:2/4]
An attacker can bypass security features in the checkout process,
in order to obtain names, addresses, phones of other customers.
[severity:2/4]
An attacker can change the identifier of a page, in order to
obtain information of other customers. [severity:2/4]
An attacker can use a bad image URL to trigger an error containing
the installation path of the server. [severity:1/4]
An attacker can use a vulnerability to upload a spreadsheet with a
bad formula to execute code. [severity:2/4]
An attacker can trigger a Cross Site Scripting via Authorize.Net
Direct Post, in order to execute JavaScript code in the context of
the web site. [severity:2/4]
An attacker can create a malicious package, and then invite the
victim to install it on the server, in order to overwrite a file
on the system. [severity:2/4]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Magento-Community-Entreprise-Edition-seven-vulnerabilities-16940