OXID eShop Community Edition before 6.0.0 RC3 (development), 4.10.x before 4.10.6 (maintenance), and 4.9.x before 4.9.11 (legacy), Enterprise Edition before 6.0.0 RC3 (development), 5.2.x before 5.2.11 (legacy), and 5.3.x before 5.3.6 (maintenance), and Professional Edition before 6.0.0 RC3 (development), 4.9.x before 4.9.11 (legacy) and 4.10.x before 4.10.6 (maintenance) allow remote attackers to crawl specially crafted URLs (aka "forced browsing") in order to overflow the database of the shop and consequently make it stop working. Prerequisite: the shop allows rendering empty categories to the storefront via an admin option.
References
Link | Resource |
---|---|
https://bugs.oxid-esales.com/view.php?id=6678 | Vendor Advisory |
https://oxidforge.org/en/security-bulletin-2017-002.html | Patch Vendor Advisory |
https://bugs.oxid-esales.com/view.php?id=6678 | Vendor Advisory |
https://oxidforge.org/en/security-bulletin-2017-002.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.oxid-esales.com/view.php?id=6678 - Vendor Advisory | |
References | () https://oxidforge.org/en/security-bulletin-2017-002.html - Patch, Vendor Advisory |
Information
Published : 2018-02-20 23:29
Updated : 2024-11-21 03:13
NVD link : CVE-2017-14993
Mitre link : CVE-2017-14993
CVE.ORG link : CVE-2017-14993
JSON object : View
Products Affected
oxid-esales
- eshop
CWE
CWE-425
Direct Request ('Forced Browsing')