Security bulletin: 2009-004

As part of our regular security audit, the following issue has been identified:

Synopsis

Specially crafted SQL statements can lead to unauthorized access to the database.

State

Resolved in current OXID eShop release 4.1.6. Fix for previous major releases will be available soon.

Impact

By sending specially crafted SQL statements, unauthorized users may gain access to sensitive information stored in the database.

No exploits are known as of today.

Affected products, releases and platforms

Products:

  • OXID eShop Professional Edition
  • OXID eShop Enterprise Edition
  • OXID eShop Community Edition

Releases:

  • Professional, Enterprise and Community Edition: 4.0.0.0_13895, 4.0.0.0_13934, 4.0.0.0_14260, 4.0.0.1_14455, 4.0.0.2_14842, 4.0.0.2_14967, 4.0.1.0_15990, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4 and 4.1.5
  • Enterprise Edition: in addition to the above, all 2.x versions
  • Professional Edition: in addition to the above, all 3.x versions

Platforms:

  • Above releases are affected on all platforms.

Note: Older releases than the ones mentioned might as well be affected. They are considered end of life and will not be supported.

Resolution

The issue has been addressed in the following releases:

  • OXID eShop Professional Edition version 4.1.6
  • OXID eShop Enterprise Edition version 4.1.6
  • OXID eShop Community Edition version 4.1.6

For the legacy release OXID eShop Professional Edition 3.0.4.1 and Enterprise Edition 2.7.0.3, a separate fix will be made available shortly after the release of this security bulletin.

Note: Users of the legacy < 2.7.0.3 and < 3.0.4.1 releases will first have to install the latest update in order to apply the fix.

Credits

The security issue has been found during one of our regular security audits.

Stay up-to-date

To receive upcoming OXID Security Bulletins, please subscribe to the mailing lists or the Announcement forum

How to report security issues

Learn how to report security issues in the Security overview page.

 

0.00 avg. rating (0% score) - 0 votes


0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *