CVE-2015-3458

The fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 does not restrict the stream wrapper used in a template path, which allows remote administrators to include and execute arbitrary PHP files via the phar:// stream wrapper, related to the setScriptPath function. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have privileges to include arbitrary files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:magento:magento:1.9.1.0:*:*:*:community:*:*:*
cpe:2.3:a:magento:magento:1.14.1.0:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ - Exploit () http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ - Exploit
References () http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability - Patch, Vendor Advisory () http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/74412 - () http://www.securityfocus.com/bid/74412 -
References () http://www.securitytracker.com/id/1032230 - () http://www.securitytracker.com/id/1032230 -

Information

Published : 2015-04-29 22:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3458

Mitre link : CVE-2015-3458

CVE.ORG link : CVE-2015-3458


JSON object : View

Products Affected

magento

  • magento
CWE
CWE-264

Permissions, Privileges, and Access Controls