CVE-2023-41879
Vulnerability from cvelistv5
Published
2023-09-11 21:14
Modified
2024-09-26 16:55
Severity ?
EPSS score ?
Summary
Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenMage | magento-lts |
Version: <= 19.5.0 Version: >= 20.0.0, <= 20.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "name": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "name": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*" ], "defaultStatus": "unknown", "product": "magento", "vendor": "openmage", "versions": [ { "lessThanOrEqual": "19.5.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "20.1.0", "status": "affected", "version": "20.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41879", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T16:53:59.562897Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T16:55:58.992Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "magento-lts", "vendor": "OpenMage", "versions": [ { "status": "affected", "version": "\u003c= 19.5.0" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c= 20.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a \"guest-view\" cookie which contains the order\u0027s \"protect_code\". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-11T21:14:28.597Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp" }, { "name": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128" }, { "name": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1" }, { "name": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1" } ], "source": { "advisory": "GHSA-9358-cpvx-c2qp", "discovery": "UNKNOWN" }, "title": "Magento LTS\u0027s guest order \"protect code\" can be brute-forced too easily" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41879", "datePublished": "2023-09-11T21:14:28.597Z", "dateReserved": "2023-09-04T16:31:48.223Z", "dateUpdated": "2024-09-26T16:55:58.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-41879\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-09-11T22:15:08.267\",\"lastModified\":\"2024-11-21T08:21:50.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a \\\"guest-view\\\" cookie which contains the order\u0027s \\\"protect_code\\\". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.\"},{\"lang\":\"es\",\"value\":\"Magento LTS es el c\u00f3digo base oficial de OpenMage LTS. Los pedidos de invitados se pueden ver sin autenticaci\u00f3n utilizando una cookie de \\\"guest-view\\\" que contiene el \\\"protect_code\\\" del pedido. Este c\u00f3digo tiene 6 caracteres hexadecimales, lo que podr\u00eda decirse que no es suficiente para evitar un ataque de fuerza bruta. Exponer cada orden requerir\u00eda un ataque de fuerza bruta por separado. Este problema se solucion\u00f3 en las versiones 19.5.1 y 20.1.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*\",\"versionEndExcluding\":\"19.5.1\",\"matchCriteriaId\":\"C2C082C2-33B8-42AA-A80D-7FC64CBEA8A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"20.0.0\",\"versionEndExcluding\":\"20.1.1\",\"matchCriteriaId\":\"C0ACC44D-FE37-4C32-B49F-DD00D3CAA1DA\"}]}]}],\"references\":[{\"url\":\"https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp\", \"name\": \"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128\", \"name\": \"https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877\", \"name\": \"https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1\", \"name\": \"https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1\", \"name\": \"https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:09:49.294Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-41879\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T16:53:59.562897Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*\"], \"vendor\": \"openmage\", \"product\": \"magento\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"19.5.0\"}, {\"status\": \"affected\", \"version\": \"20.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"20.1.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T16:55:54.708Z\"}}], \"cna\": {\"title\": \"Magento LTS\u0027s guest order \\\"protect code\\\" can be brute-forced too easily\", \"source\": {\"advisory\": \"GHSA-9358-cpvx-c2qp\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"OpenMage\", \"product\": \"magento-lts\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c= 19.5.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 20.0.0, \u003c= 20.1.0\"}]}], \"references\": [{\"url\": \"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp\", \"name\": \"https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128\", \"name\": \"https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877\", \"name\": \"https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1\", \"name\": \"https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1\", \"name\": \"https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a \\\"guest-view\\\" cookie which contains the order\u0027s \\\"protect_code\\\". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-330\", \"description\": \"CWE-330: Use of Insufficiently Random Values\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-09-11T21:14:28.597Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-41879\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-26T16:55:58.992Z\", \"dateReserved\": \"2023-09-04T16:31:48.223Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-09-11T21:14:28.597Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.