Vulnerability Description
The fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 does not restrict the stream wrapper used in a template path, which allows remote administrators to include and execute arbitrary PHP files via the phar:// stream wrapper, related to the setScriptPath function. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have privileges to include arbitrary files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Magento | Magento | 1.9.1.0 |
Related Weaknesses (CWE)
References
- http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/Exploit
- http://magento.com/blog/technical/critical-security-advisory-remote-code-executiPatchVendor Advisory
- http://www.securityfocus.com/bid/74412
- http://www.securitytracker.com/id/1032230
- http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/Exploit
- http://magento.com/blog/technical/critical-security-advisory-remote-code-executiPatchVendor Advisory
- http://www.securityfocus.com/bid/74412
- http://www.securitytracker.com/id/1032230
FAQ
What is CVE-2015-3458?
CVE-2015-3458 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 does not restrict the stream wrapper used in a template...
How severe is CVE-2015-3458?
CVE-2015-3458 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3458?
Check the references section above for vendor advisories and patch information. Affected products include: Magento Magento.