Magmi - Magento Extenstion Vulnerability - WebSecuritySpecialist
Hire Us For Secure Web Development and Security

Thursday, 19 February 2015

Magmi - Magento Extenstion Vulnerability

Magento is a E-commerce Platform based on Zend Framework. Best OpenSource CMS that can be use to develop the Shopping Website. Most of the use get problem while importing the products, images etc one by one. There is a solution that overcome this issue. "MAGMI - Magento Mass Importer" Download Now.


  • Very fast , Direct SQL Magento product import
  • Automatable through CLI or curl/wget , Web UI available for config & one shot runs
  • Very advanced features (flexible csv format support (Dataflow based , subset of it & extensions) , computed values through Value Replacer plugins)
  • Handles multiple stores configurations
  • Can import configurables , simples , grouped
  • Images import (remote & local) through Image Processor Plugin
  • Can import "customizable options" through custom options plugin
  • Can import tier prices
  • Can create categories on the fly based on name / tree description
  • Will automatically create select/multiselect option values based on imported data
  • Can be integrated in custom PHP scripts through "Datapump API" feature
  • Support for bundle & downloadable

While working on the Magento Website. i notice some Serious Vulnerability in Magmi

  • LFI - Local File Inclusion

  • XSS - Cross Site Scripting

To Test the LFI just follow Link
lfi-magmi To Test XSS just follow Link

How to Secure this ?

Update it to the latest Version.

Or Block the access via .htaccess & allow to single trusted IP

RewriteCond %{REQUEST_URI} ^/(index.php/)?magmi/ [NC] RewriteCond %{REMOTE_ADDR} !^ RewriteRule ^(.*)$ http://%{HTTP_HOST}/ [R=302,L]

No comments:

Post a Comment