CVE-2024-41676 – Magento LTS vulnerable to stored Cross-site Scripting (XSS) in admin system configs
https://notcve.org/view.php?id=CVE-2024-41676
Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases. But because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher. • https://github.com/OpenMage/magento-lts/commit/484cf8afc550e98bbf2c03fbb29a8450a32e7948 https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5vrp-638w-p8m2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-41879 – Magento LTS's guest order "protect code" can be brute-forced too easily
https://notcve.org/view.php?id=CVE-2023-41879
Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1. • https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128 https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877 https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1 https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1 https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp • CWE-330: Use of Insufficiently Random Values •
CVE-2023-23617 – OpenMage LTS has DoS vulnerability in MaliciousCode filter
https://notcve.org/view.php?id=CVE-2023-23617
OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds. OpenMage LTS es una plataforma de comercio electrónico. • https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172 https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2021-41231 – OpenMage LTS DataFlow upload remote code execution vulnerability
https://notcve.org/view.php?id=CVE-2021-41231
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue. OpenMage LTS es una plataforma de comercio electrónico. Antes de las versiones 19.4.22 y 20.0.19, un administrador con permisos para cargar archivos a través de DataFlow y crear productos podía ejecutar código arbitrario a través del perfil de conversión. • https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4 https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2021-41144 – OpenMage LTS authenticated remote code execution through layout update
https://notcve.org/view.php?id=CVE-2021-41144
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue. OpenMage LTS es una plataforma de comercio electrónico. Antes de las versiones 19.4.22 y 20.0.19, un bloque de diseño podía omitir la lista negra de bloques para ejecutar código remoto. • https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8 https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22 https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19 https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •