Magento SUPEE-10975 Patch Assessment

By danielle

This post is meant to information you about the security updates released for all existing versions of Magento 1. These updates include 19 vulnerability enhancements, the majority of them are listed as “Medium” severity, but there are a number of “High” severity and two “Critical” issues as well. The top critical issues ensure that attackers will not be able to brute force their way into the admin panel via RSS nodes, and includes the removal of functionality which allowed customer credit card info to be stored in the database.

Several of the “High” and “Medium” issues prevent Remote Code Execution (RCE) in admin areas such as customer imports,  CMS pages, video upload, API calls, and dataflows. There are also many that correct Cross-Site Scripting (XSS) opportunities with admin access in the Newsletter template settings, CMS previews with version history, image uploads, and even within Google Analytics configuration. Cross-Site Request Forgery (CSRF) issues have been patched in regards to customer group deletion via the GET requests from the Site Map and escalated privilege, and CSRF opportunities for mass Block deletion.

The remaining patch items include ensuring that Enterprise Edition corrected several areas where website, store and store group names were unescaped in templates, strengthening the customer wishlist module so that spamming is avoided, and allowing CAPTCHA to be enabled on the “Send to a Friend” feature to prevent bot attacks and maxing out mailer usage.

The 1.x updates also include low-security enhancements, such as older versions of jQuery causing PCI scans to fail and admin panels being accessible outside of a whitelist.

Some of the vulnerabilities below also apply to Magento 2.x, but we will detail those in a separate post.

Severity Assessment

This patch requires expedited release. While most of these vulnerabilities require at least limited Admin access, some of the most severe and high risk can be exploited by anonymous users. Those addressed in the patch/upgrade are present on production websites and the public disclosure of these vulnerabilities presents a risk for unpatched/outdated websites. Details for each entry are below.

Vulnerability CodeDescriptionCVSSv3 SeverityVersions Affected
PRODSECBUG-1589Stops Brute Force Requests via basic RSS authentication9.0 (Critical)1.9.3.x, 1.14.3.x
MAG-23M1 Credit Card Storage Capability9.0 (Critical)1.9.3.x, 1.14.3.x
PRODSECBUG-2149Authenticated RCE using customer import8.5 (High)1.9.3.x, 1.14.3.x
PRODSECBUG-2159API Based RCE Vulnerability8.5 (High)1.9.3.x, 1.14.3.x, 2.1.x, 2.2.x
PRODSECBUG-2156RCE Via Unauthorized Upload8.5 (High)1.9.3.x, 1.14.3.x, 2.1.x, 2.2.x
PRODSECBUG-2155Authenticated RCE using dataflow8.5 (High)1.9.3.x, 1.14.3.x
PRODSECBUG-2053Prevents XSS in Newsletter Template6.5 (Medium)1.9.3.x, 1.14.3.x, 2.1.x, 2.2.x
PRODSECBUG-2142XSS in CMS Preview6.5 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-1860Admin Account XSS Attack Cessation via Filename6.5 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2119EE Patch to include names in templates6.5 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2129XSS in Google Analytics Vulnerability6.5 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2019Merchant Wishlist Security Strengthening5.3 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2104Send to a Friend Vulnerability5.3 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2125CSRF on deletion of Blocks Vulnerability4.2 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2088CSRF Vulnerability related to Customer Group Deletion4.2 (Medium)1.9.3.x, 1.14.3.x, 2.1.x, 2.2.x
PRODSECBUG-2140CSRF on deletion of Site Map4.2 (Medium)1.9.3.x, 1.14.3.x
PRODSECBUG-2108Outdated jQuery causing PCI scanning failures0.0 (None)1.9.3.x, 1.14.3.x, 2.1.x, 2.2.x
MAG-12, MAG-2Encryption Keys Stored in Plain Text0.0 (None)1.9.3.x, 1.14.3.x, 2.1.x, 2.2.x
PRODSECBUG-2141Unauthorized Admin Panel Bypass0.0 (None)1.9.3.x, 1.14.3.x

Affected Versions

All websites running Magento 1.9.3.x versions below 1.9.4.0, and all websites running Magento 1.14.3.x versions below 1.14.4.0 are affected.

Known Issues

The Magento community has identified a few issues with the latest 1.x patch. They are as follows:

  • When secret keys are enabled, customer groups will no longer be able to be deleted from the admin panel, as a return is missing for the new Mage_Adminhtml_Block_Customer_Group_Edit::getDeleteUrl() method.
  • Disabling the Magento_Sendfriend module will now result in an exception if you do not disable the Magento_Captcha module first.
  • Template changes for the new Magento_Sendfriend CAPTCHA abilities were made only in the rwd/default theme package, and not in the base/default theme package. If your theme depends on base/default or you are using base/default then CAPTCHA will not be available without modification to these files.

Looking for Magento Support?

Our monthly technical support services are the perfect blend of strategy and tech support for any retailer looking to drive growth into the future.

Learn More


Related Links

Release Notes: MOS1.9.4.0, MC1.14.4.0

Security Update: SUPEE-10975

Known Issues: Magento SX Thread