24 Feb Security Advisory – SOS-09-002- Magento Multiple Cross-Site Scripting Vulnerabilities
Release Date: 24-Feb-2009
Last Update: –
Vendor Notification Date: 21-Jan-2009
Product: Magento
Platform: Linux / PHP (verified), possibly others
Affected versions: Magento 1.2.0 (verified), possibly others
Severity Rating: Medium
Impact: Cookie/credential theft, impersonation, loss of
confidentiality
Attack Vector: Remote with authentication
Solution Status: Vendor patch not yet available
CVE reference: CVE – 2009-0541
Details
Magento is an ecommerce application. During an application penetration test Sense of Security identified multiple cross-site scripting vulnerabilities in the administrator logon, administrator password reminder and update downloader features of the Magento application. This occurred as a result of the application not properly filtering HTML tags which allowed malicious JavaScript to be embedded. When input is incorrectly validated and not properly sanitised and then displayed in a web page, attackers can trick users into viewing the web page and causing malicious code to be executed.
Please refer to the PDF version of this advisory for proof of concept code examples.
Solution
The vendor has advised that the fix will be made available in the near future.
Discovered By
Loukas Kalenderidis from Sense of Security Labs.
Sorry, the comment form is closed at this time.