First published: Mon Sep 25 2017(Updated: )
Password reset tokens in Magento CE before 1.9.2.2, and Magento EE before 1.14.2.2 are passed via a GET request and not canceled after use, which allows remote attackers to obtain user passwords via a crafted external service with access to the referrer field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc | <=1.9.2.1 | |
CentOS Libgcc | <=1.14.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8707 is classified as a high severity vulnerability due to the potential for remote attackers to exploit password reset tokens.
To fix CVE-2015-8707, upgrade to Magento CE version 1.9.2.2 or later, or Magento EE version 1.14.2.2 or later.
CVE-2015-8707 affects users of Magento CE versions prior to 1.9.2.2 and Magento EE versions prior to 1.14.2.2.
CVE-2015-8707 enables remote attackers to steal user passwords through crafted requests leveraging the vulnerability in password reset handling.
CVE-2015-8707 was disclosed in 2015, highlighting a significant security issue in older versions of Magento.