Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:MAGENTO-PAR-AUTH-BYPASS

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Magento Forwarded Parameter Authentication Bypass

Release Date

2015/05/06

Update Number

2492

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Magento Forwarded Parameter Authentication Bypass


This signature detects attempts to exploit a known vulnerability against Magento. Successful exploitation of this vulnerability may allow the attacker to gain access to the target system.

Extended Description

Multiple directory traversal vulnerabilities in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allow remote authenticated users to include and execute certain PHP files via (1) .. (dot dot) sequences in the PATH_INFO to index.php or (2) vectors involving a block value in the ___directive parameter to the Cms_Wysiwyg controller in the Adminhtml module, related to the blockDirective function and the auto loading mechanism. NOTE: vector 2 might not cross privilege boundaries, since administrators might already have the privileges to execute code and upload files.

Affected Products

  • Magento magento 1.14.1.0
  • Magento magento 1.9.1.0

References

  • CVE: CVE-2015-1398

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out