Vulnerability Description
PHP remote file inclusion vulnerability in the fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote administrators to execute arbitrary PHP code via a URL in unspecified vectors involving the setScriptPath function. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have privileges to include arbitrary files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Magento | Magento | 1.9.1.0 |
Related Weaknesses (CWE)
References
- http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/Exploit
- http://magento.com/blog/technical/critical-security-advisory-remote-code-executiPatchVendor Advisory
- http://www.securitytracker.com/id/1032194
- http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/Exploit
- http://magento.com/blog/technical/critical-security-advisory-remote-code-executiPatchVendor Advisory
- http://www.securitytracker.com/id/1032194
FAQ
What is CVE-2015-1399?
CVE-2015-1399 is a vulnerability with a CVSS score of 6.5 (MEDIUM). PHP remote file inclusion vulnerability in the fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remot...
How severe is CVE-2015-1399?
CVE-2015-1399 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1399?
Check the references section above for vendor advisories and patch information. Affected products include: Magento Magento.