First published: Thu Sep 14 2017(Updated: )
The Fastly CDN module before 1.2.26 for Magento2, when used with a third-party authentication plugin, might allow remote authenticated users to obtain sensitive information from authenticated sessions via vectors involving caching of redirect responses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/fastly/magento2 | <1.2.26 | 1.2.26 |
Fastly | <=1.2.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13761 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2017-13761, upgrade the Fastly CDN module to version 1.2.26 or later.
Magento 2 users employing the Fastly CDN module with third-party authentication plugins are affected by CVE-2017-13761.
CVE-2017-13761 facilitates a remote authenticated user attack that can lead to the leakage of sensitive session information.
The potential impact of CVE-2017-13761 includes unauthorized access to sensitive user data through cached response vectors.