First published: Fri Apr 15 2016(Updated: )
The getOrderByStatusUrlKey function in the Mage_Rss_Helper_Order class in app/code/core/Mage/Rss/Helper/Order.php in Magento Enterprise Edition before 1.14.2.3 and Magento Community Edition before 1.9.2.3 allows remote attackers to obtain sensitive order information via the order_id in a JSON object in the data parameter in an RSS feed request to index.php/rss/order/status.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc | <=1.9.2.2 | |
CentOS Libgcc | <=1.14.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2212 is classified as a medium severity vulnerability due to its potential to expose sensitive order information.
To fix CVE-2016-2212, upgrade your Magento installation to version 1.9.2.3 for Community Edition or 1.14.2.3 for Enterprise Edition or later.
The impact of CVE-2016-2212 allows remote attackers to access sensitive order details using the order_id parameter in a JSON object.
CVE-2016-2212 affects Magento Community Edition versions prior to 1.9.2.3 and Enterprise Edition versions prior to 1.14.2.3.
Any Magento users running affected versions of the platform before the specified versions are vulnerable to CVE-2016-2212.