First published: Wed Feb 25 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Magento 1.2.0 and 1.2.1.1 allow remote attackers to inject arbitrary web script or HTML via (1) the username field in an admin/ request to index.php, possibly related to the login[username] parameter and the app/code/core/Mage/Admin/Model/Session.php login function; (2) the email address field in an admin/index/forgotpassword/ request to index.php, possibly related to the email parameter and the app/code/core/Mage/Adminhtml/controllers/IndexController.php forgotpasswordAction function; or (3) the return parameter to the default URI under downloader/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Magento | =1.2.1.1 | |
Magento | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0541 is classified as a high severity vulnerability due to its potential for remote exploitation and impact on user data.
To mitigate CVE-2009-0541, it is recommended to upgrade to a patched version of Magento that resolves these cross-site scripting vulnerabilities.
CVE-2009-0541 affects Magento versions 1.2.0 and 1.2.1.1.
CVE-2009-0541 can allow attackers to execute arbitrary web scripts or HTML on the affected Magento installations.
Yes, CVE-2009-0541 is related to the login process, as it involves the username field in admin requests.