oss-sec mailing list archives

Re: CVE Request: Magento SWF XSS


From: cve-assign () mitre org
Date: Fri, 4 Dec 2015 23:42:56 -0500 (EST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/

DOM based Cross Site Scripting (XSS)

http://[magento_url]/skin/adminhtml/default/default/media/editor.swf
http://[magento_url]/skin/adminhtml/default/default/media/uploader.swf
http://[magento_url]/skin/adminhtml/default/default/media/uploaderSingle.swf

editor.swf?bridgeName=[XSS]

Use CVE-2014-9758. Often "uploader.swf" XSS reports for various
products are a consequence of uploader.swf in old versions of YUI,
e.g., CVE-2013-4941. As far as we know, YUI did not ever include
editor.swf or uploaderSingle.swf files. We don't know of any
relationship between any Magento .swf file and any YUI .swf file, and
therefore there is a new CVE. For reference, other .swf filenames
associated with YUI 2.x are YUIBridgeProject.swf, charts.swf,
connection.swf, datastore.swf, and swfstore.swf.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Eg7t
-----END PGP SIGNATURE-----


Current thread: