Categories:

Sign up to receive Magento security alerts as they are released.

Sign Up

Report a security bug in the Magento system and be eligible for a cash reward.

Aug 4, 2015

SUPEE-6482 is a bundle of of patches that resolve several security-related issues.

Aug 4, 2015

Cross-site scripting vulnerability affects registered users. Attack through unescaped search parameter. Risk of cookie theft and impersonating as the user.

Aug 4, 2015

Unvalidated host header leaks into response and page. Because the page can be cached, this leak poses a risk for all store customers because any HTML or JavaScript code can be injected. Such an exploit works only with specific server configurations, and allows an attacker to intercept a session or modify a page with fake credit card forms, etc.

Aug 4, 2015

Incorrect encoding of API password can lead to probing internal network resources or remote file inclusion.

Aug 4, 2015

Incorrect validation of a SOAP API request makes it possible to autoload code. The exploit requires the attacker to first log in with API credentials. Depending on the PHP version and/or configuration settings, code can then be loaded from a remote location.

Jul 7, 2015

SUPEE-6285 is a bundle of eight patches that resolves several security-related issues.

Jul 7, 2015

The vulnerability allows an attacker to include an unescaped customer name in the New Orders RSS feed. By manipulating the customer name, an attacker can inject incorrect or malicious data into the feed, and expose the store to risk.

Jul 7, 2015

An attacker can inject JavaScript into the title of a Widget from the Magento Admin. The code can be later executed when another administrator opens the Widget page.

The risk requires the attacker to have administrator access to the store. However, when executed, the attacker can take over other administrator accounts.

Jul 7, 2015

Log files are created with permission settings that are too broad, that allows them to be read or altered by another user on the same server. The risk of an internal information leak is low.

Jul 7, 2015

Directly accessing the URL of files that are related to Magento Connect produces an exception that includes the server path. The exception is generated regardless of the configuration settings that control the display of exceptions.There is a low risk of attackers gaining a sufficient understanding of the site structure to target an attack.

Pages