This bulletin has been assigned a CVE identifier of CVE-2009-3112
Released: February 18th, 2009
As part of our regular security audit, the following issue has been identified:
Specially crafted parameter can lead to unauthorized administrative access to shop backend.
Resolved in upcoming OXID eShop release (see below for details). Hotfix for current and older releases is available.
By adding a specially crafted parameter to the URL of the shop backend, unauthorized users may gain administrative privileges. No exploits are known as of today.
Affected products, releases and platforms
- OXID eShop Professional Edition
- OXID eShop Enterprise Edition
- OXID eShop Community Edition
- 126.96.36.199_13895, 188.8.131.52_13934, 184.108.40.206_14260, 220.127.116.11_14455, 18.104.22.168_14842, 22.214.171.124_14967, 126.96.36.199_15990
- Above releases are affected on all platforms.
The issue will be addressed in the following future releases:
- OXID eShop Professional Edition version 4.1.0
- OXID eShop Enterprise Edition version 4.1.0
- OXID eShop Community Edition version 4.1.0
For the currently affected releases, a hotfix is available at http://support.oxid-esales.com/versions/. All users of OXID eShop should install the hotfix immediately.
There is no workaround. See "Resolution" above.
The security issue has been found during one of our regular security audits.
How to report security issues
Learn how to report security issues in the Security overview page.