First published: Wed Apr 29 2015(Updated: )
SQL injection vulnerability in the getCsvFile function in the Mage_Adminhtml_Block_Widget_Grid class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote administrators to execute arbitrary SQL commands via the popularity[field_expr] parameter when the popularity[from] or popularity[to] parameter is set.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc | =1.9.1.0 | |
CentOS Libgcc | =1.14.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1397 has a high severity rating due to its potential to allow remote SQL execution by unauthorized administrators.
To fix CVE-2015-1397, upgrade to Magento Community Edition 1.9.2 or later and Magento Enterprise Edition 1.14.2 or later to eliminate the vulnerability.
CVE-2015-1397 affects Magento Community Edition 1.9.1.0 and Magento Enterprise Edition 1.14.1.0.
CVE-2015-1397 exploits SQL injection by manipulating the popularity[field_expr] parameter, enabling execution of arbitrary SQL commands.
CVE-2015-1397 can be exploited by remote administrators with access to the affected Magento versions.