CVE-2014-8770: MAGMI plugin for Magento Unsafe File Upload
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dweeves/magmi | composer | <= 0.7.17a |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from improper handling of uploaded ZIP files in MAGMI's plugin installation process. The exploit involves uploading a ZIP containing a PHP file, which is extracted into the web-accessible magmi/plugins/ directory. The critical flaw is the use of ZipArchive::extractTo() in magmi/web/magmi.php without validating the extracted file types. This allows attackers to upload and execute arbitrary PHP code. The function ZipArchive::extractTo() is directly responsible for writing the malicious file to the server, and its lack of input validation makes it the clear vulnerable component. Confidence is high because the exploit's success hinges on this extraction mechanism, and ZipArchive::extractTo() is the standard PHP method for ZIP extraction.