The create function in app/code/core/Mage/Catalog/Model/Product/Api/V2.php in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to index.php/api/v2_soap.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/133544/Magento-1.9.2-File-Inclusion.html | exploit vdb entry third party advisory |
http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html | third party advisory exploit |
http://karmainsecurity.com/KIS-2015-04 | third party advisory exploit |
http://seclists.org/fulldisclosure/2015/Sep/48 | mailing list exploit third party advisory |
http://magento.com/security/patches/supee-6482 | vendor advisory |