CVE-2023-41879

Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*
cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*

History

21 Nov 2024, 08:21

Type Values Removed Values Added
References () https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 - Patch () https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 - Patch
References () https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 - Patch () https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 - Patch
References () https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 - Release Notes () https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 - Release Notes
References () https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 - Release Notes () https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 - Release Notes
References () https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp - Exploit, Third Party Advisory () https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp - Exploit, Third Party Advisory

15 Sep 2023, 17:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Openmage
Openmage magento
CPE cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*
References (MISC) https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp - (MISC) https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp - Exploit, Third Party Advisory
References (MISC) https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 - (MISC) https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 - Release Notes
References (MISC) https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 - (MISC) https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 - Patch
References (MISC) https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 - (MISC) https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 - Patch
References (MISC) https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 - (MISC) https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 - Release Notes

11 Sep 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-11 22:15

Updated : 2024-11-21 08:21


NVD link : CVE-2023-41879

Mitre link : CVE-2023-41879

CVE.ORG link : CVE-2023-41879


JSON object : View

Products Affected

openmage

  • magento
CWE
CWE-330

Use of Insufficiently Random Values