First published: Wed Jan 15 2020(Updated: )
The create function in `app/code/core/Mage/Catalog/Model/Product/Api/V2.php` in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to `index.php/api/v2_soap`.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/core | <1.9.2.1 | 1.9.2.1 |
All of | ||
Any of | ||
Magento Magento | <1.9.2.1 | |
Magento Magento | <1.14.2.1 | |
Any of | ||
PHP PHP | <5.4.24 | |
PHP PHP | >=5.4.25<5.5.8 | |
Magento Magento | <1.9.2.1 | |
Magento Magento | <1.14.2.1 | |
PHP PHP | <5.4.24 | |
PHP PHP | >=5.4.25<5.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2015-6497.
CVE-2015-6497 has a severity of 8.8 (high).
Magento Community Edition before 1.9.2.1 and Magento Enterprise Edition before 1.14.2.1 are affected by CVE-2015-6497.
A remote attacker can exploit CVE-2015-6497 by executing arbitrary PHP code via the productData parameter.
Yes, patches for CVE-2015-6497 are available. Please refer to the following links for more information: [Patch 1](http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html), [Patch 2](http://karmainsecurity.com/KIS-2015-04), [Patch 3](http://magento.com/security/patches/supee-6482).