PHP remote file inclusion vulnerability in the fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote administrators to execute arbitrary PHP code via a URL in unspecified vectors involving the setScriptPath function. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have privileges to include arbitrary files.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ - Exploit | |
References | () http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability - Patch, Vendor Advisory | |
References | () http://www.securitytracker.com/id/1032194 - |
Information
Published : 2015-04-29 22:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1399
Mitre link : CVE-2015-1399
CVE.ORG link : CVE-2015-1399
JSON object : View
Products Affected
magento
- magento
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')