SB2024062826 - Multiple vulnerabilities in Aimeos shop and e-commerce framework extension for TYPO3



SB2024062826 - Multiple vulnerabilities in Aimeos shop and e-commerce framework extension for TYPO3

Published: June 28, 2024

Security Bulletin ID SB2024062826
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) External Control of File Name or Path (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to the affected extension permits specifying the file extension for uploaded product images. A remote user can upload a specially crafted image file with a PHP executable extension and execute arbitrary code on the target system.


2) Authorization bypass through user-controlled key (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected extension does not verify if a specified digital product identifier is authorized for download. A remote user can download digital products without completing payment, leading to an Insecure Direct Object Reference (IDOR) issue.


Remediation

Install update from vendor's website.