This bulletin has been assigned a CVE identifier of CVE-2009-3113
Released: May 11th, 2009
Thanks to our partner Andreas Ziethen, the following issue has been identified:
Specially crafted parameter can lead to unauthorized write access to product reviews in the shop.
Resolved in the upcoming OXID eShop release. Fix for previous major releases will be available soon.
By adding a specially crafted parameter to the URL of the shop or to the generated e-mail link, unauthorized users may gain write access to product reviews.
No exploits are known as of today.
Affected products, releases and platforms
- OXID eShop Professional Edition
- OXID eShop Enterprise Edition
- OXID eShop Community Edition
- Professional, Enterprise and Community Edition: 126.96.36.199_13895, 188.8.131.52_13934, 184.108.40.206_14260, 220.127.116.11_14455, 18.104.22.168_14842, 22.214.171.124_14967, 126.96.36.199_15990, 4.1.0-17976, 4.1.1-18442
- Enterprise Edition: in addition to the above, all 2.x versions
- Professional Edition: in addition to the above, all 3.x versions
- Above releases are affected on all platforms.
Note: Older releases than the ones mentioned might as well be affected. They are considered end of life and will not be supported.
The issue will be addressed in the following future releases:
- OXID eShop Professional Edition version 4.1.2
- OXID eShop Enterprise Edition version 4.1.2
- OXID eShop Community Edition version 4.1.2
For the legacy release OXID eShop Professional Edition 188.8.131.52 and Enterprise Edition 184.108.40.206, a separate fix will be made available within two weeks following the release of this security bulletin.
Note: Users of the legacy < 220.127.116.11 and < 18.104.22.168 releases will first have to install the latest update in order to apply the fix.
The security issue has been found by our partner Andreas Ziethen.
How to report security issues
Learn how to report security issues in the Security overview page.