SUPEE-9767

waf-stackSUPEE-9767, Enterprise Edition 1.14.3.3 and Community Edition 1.9.3.3 address several security issues.

 

 

 

 


We offer a Patch install service for all customers, please log into our client area and order here

 

 

NOTE:

Before applying the patch or upgrading to the latest release, make sure to disable Symlinks setting in System > Configuration > Advanced > Developer > Enable Symlinks. The setting, if enabled, will override configuration file setting and changing it will require direct database modification.

Patches and upgrades are available for the following Magento versions:

  • Enterprise Edition 1.9.0.0-1.14.3.2: SUPEE-9767 or upgrade to Enterprise Edition 1.14.3.3
  • Community Edition 1.5.0.1-1.9.3.2: SUPEE-9767 or upgrade to Community Edition 1.9.3.3

 

APPSEC-1281: Remote code execution through symlinks
Type: Remote Code Execution (RCE)
CVSSv3 Severity: 8.8 (High)
Known Attacks: Yes. Attackers are disabling a configuration protection after gaining admin access and are uploading malicious code.
Description: Use of the AllowSymlinks option in configuration settings can enable the upload of an image that contains malicious code. Although this option is disabled by default, an attacker with access to store configuration settings can enable it and remotely execute code.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Wilko Nienhaus
APPSEC-1777: Remote Code Execution in DataFlow
Type: Remote Code Execution (RCE)
CVSSv3 Severity: 8.8 (High)
Known Attacks: None
Description: Magento administrators with access to DataFlow functionality can use it to upload and execute arbitrary code.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Fabain
APPSEC-1686: Remote Code Execution in the Admin panel
Type: Remote Code Execution (RCE)
CVSSv3 Severity: 8.8 (High)
Known Attacks: None
Description: Store administrators with access to CMS functionality can remotely execute code.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3, Magento 2.0 prior to 2.0.14, Magento 2.1 prior to 2.1.7
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767, Magento 2.0.14 and Magento 2.1.7
Reporter: Fabain
APPSEC-1320: SQL injection in Visual Merchandiser (Enterprise Edition)
Type: SQL Injection
CVSSv3 Severity: 8.8 (High)
Known Attacks: None
Description: The Visual Merchandiser contains an SQL injection vulnerability that can potentially allow a user with Admin privileges to directly edit the database.
Product(s) Affected: Magento EE prior to 1.14.3.3
Fixed In: EE 1.14.3.3, SUPEE-9767
Reporter: Oleksandr Semchyshyn
APPSEC-1634: XSS in data fields
Type: Cross-Site Scripting (XSS, reflected)
CVSSv3 Severity: 8.7 (High)
Known Attacks: None
Description: Some Admin tables do not filter data, which provides an inadvertent opening for reflected cross-site scripting attacks.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Lipsum
APPSEC-1759: XSS in Admin panel configuration
Type: Cross-Site Scripting (XSS, stored)
CVSSv3 Severity: 8.1 (High)
Known Attacks: None
Description: A Magento administrator with access to configuration settings can enter malicious code that can be executed on other Admin panel pages.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Fabain
APPSEC-1549: CSRF after logout – form key not invalidated
Type: Cross-Site Request Forgery (CSRF)
CVSSv3 Severity: 8.0 (High)
Known Attacks: None
Description: Magento does not invalidate form keys on logout, which potentially allows an attacker to execute commands as administrator after the admin logs out.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Internal
APPSEC-1693: Bypassing ACLs in store configuration permissions
Type: Privilege Escalation
CVSSv3 Severity: 6.5 (Medium)
Known Attacks: None
Description: Administrators with limited permission to modify configuration settings can also edit PayPal or payment configuration settings despite lack of explicit permissions.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Peter O’Callaghan
APPSEC-1677: Local File Disclosure for admin users with access to dataflow
Type: Information Leak (system)
CVSSv3 Severity: 6.5 (Medium)
Known Attacks: None
Description: An authenticated administrator can use DataFlow to exfiltrate system files.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Fabain
APPSEC-1546: CSRF Vulnerability in Checkout feature
Type: Cross-Site Request Forgery (CSRF)
CVSSv3 Severity: 6.1 (Medium)
Known Attacks: None
Description: Checkout functionality is vulnerable to cross-site request forgery attacks. These types of attacks are typically executed by phishing emails or pages that allow attackers to modify or harvest payment details.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Internal
APPSEC-1597: Potential for user name enumeration
Type: Insufficient Data Protection
CVSSv3 Severity: 5.3 (Medium)
Known Attacks: None
Description: When a user tries to log in using an invalid username or password, the Magento authentication mechanism responds with a message that indicates whether the username is valid. A malicious user can use this information to build a list of registered users.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Internal
APPSEC-1695: CSRF cache management
Type: Cross-Site Request Forgery (CSRF)
CVSSv3 Severity: 4.7 (Medium)
Known Attacks: None
Description: Vulnerabilities in session cache management may provide an opening for a cross-site request forgery attack. These types of attacks can include malicious clearing of session data.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Peter O’Callaghan
APPSEC-1324: Customer passwords exposed in logs
Type: Information Disclosure / Leakage (Confidential or Restricted)
CVSSv3 Severity: 4.4 (Medium)
Known Attacks: None
Description: In certain configurations, and depending on previous customer actions, a log-in action can generate an exception. Magento logs this exception, which may contain customer passwords, on the server.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767
Reporter: Peter O’Callaghan
APPSEC-1675: Cross-site Request Forgery Vulnerability in Enterprise Edition (EE) Invites
Type: Cross-Site Request Forgery (CSRF)
CVSSv3 Severity: 3.4 (Low)
Known Attacks: None
Description: The Magento EE private sale invite feature is not protected against cross-site request forgery attacks. This vulnerability potentially allows an attacker to invite himself to/register on a restricted access site.
Product(s) Affected: Magento EE prior to 1.14.3.3
Fixed In: EE 1.14.3.3, SUPEE-9767
Reporter: Peter O’Callaghan
APPSEC-1659: Vulnerabilities in JavaScript libraries
Type: Misc Vulnerabilities
CVSSv3 Severity: 0 (Low)
Known Attacks: None
Description: Magento uses versions of JavaScript libraries with known security vulnerabilities. Magento does not use the vulnerable functionality, and no Magento-specific attack vector has been found. However, out of caution, we’ve updated the JavaScript libraries in question to the latest versions. Note: this issue does not affect Magento CE version prior to 1.9.0.0 and Magento EE versions prior to 1.14.0.0.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3, Magento 2.0 prior to 2.0.14, Magento 2.1 prior to 2.1.7
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767, Magento 2.0.14 and Magento 2.1.7 allin
Reporter: Internal
APPSEC-1622: Incorrect routing of requests
Type: Abuse of Functionality
CVSSv3 Severity: 0 (None)
Known Attacks: None
Description: Incorrect request routing can enable the bypassing of web server protections, which in turn provides potentially malicious users access to the server.
Product(s) Affected: Magento CE prior to 1.9.3.3, and Magento EE prior to 1.14.3.3, Magento 2.0 prior to 2.0.14, Magento 2.1 prior to 2.1.7
Fixed In: CE 1.9.3.3, EE 1.14.3.3, SUPEE-9767, Magento 2.0.14 and Magento 2.1.7 allin
Reporter: Internal

Comments are currently closed.

top