Magento Security Update (126.96.36.199) – Zend_XmlRpc Vulnerability
A few days ago, Magento 188.8.131.52 was released to fix a very serious security vulnerability that allows attackers to read any file on the web server where the Zend XMLRPC functionality is enabled. This might include password files, configuration files, and possibly even databases if they are stored on the same machine as the Magento web server.
The Magento team provides the following info in their post:
If the patch cannot be applied immediately, the following instructions can be followed to temporarily disable the RPC functionality that contains the vulnerability. Please be advised, any integrations that rely on the XMLRPC API functionality will no longer work after this workaround is implemented.
1. On the Magento web server, navigate to the www-root where Magento app files are stored.
2. In the wwwroot, navigate to /app/code/core/Mage/Api/controllers.
3. Open XmlrpcController.php for editing.
4. Comment out or delete the body of the method: public indexAction()
5. Save the changes.
*The latest releases of Magento (Community Edition 184.108.40.206 and Enterprise Edition 220.127.116.11) incorporate the appropriate patches. please use correct versions of releases 18.104.22.168 and 22.214.171.124 .
Note: This vulnerability comes from Zend_XmlRpc, so not only Magento, but any application that uses it is vulnerable. More details about it here:
Zend_XmlRpc is vulnerable to XML eXternal Entity (XXE) Injection attacks. The SimpleXMLElement class (SimpleXML PHP extension) is used in an insecure way to parse XML data. External entities can be specified by adding a specific DOCTYPE element to XML-RPC requests. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.
Additional details are also available here.
If you have any additional information, make sure to leave a comment. Want to chat with us? Send us an email to email@example.com.