Vulnerability Description
SQL injection vulnerability in the getCsvFile function in the Mage_Adminhtml_Block_Widget_Grid class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote administrators to execute arbitrary SQL commands via the popularity[field_expr] parameter when the popularity[from] or popularity[to] parameter is set.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Magento | Magento | 1.9.1.0 |
Related Weaknesses (CWE)
References
- http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/
- http://magento.com/blog/technical/critical-security-advisory-remote-code-executiVendor Advisory
- http://www.securitytracker.com/id/1032194
- https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wildExploit
- http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/
- http://magento.com/blog/technical/critical-security-advisory-remote-code-executiVendor Advisory
- http://www.securitytracker.com/id/1032194
- https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wildExploit
FAQ
What is CVE-2015-1397?
CVE-2015-1397 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SQL injection vulnerability in the getCsvFile function in the Mage_Adminhtml_Block_Widget_Grid class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote admini...
How severe is CVE-2015-1397?
CVE-2015-1397 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1397?
Check the references section above for vendor advisories and patch information. Affected products include: Magento Magento.