Moderate severityNVD Advisory· Published Feb 24, 2015· Updated May 6, 2026
CVE-2015-2067
CVE-2015-2067
Description
Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dweeves/magmiPackagist | <= 0.7.21 | — |
Affected products
1- cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.htmlnvdExploitThird Party AdvisoryVDB EntryWEB
- www.exploit-db.com/exploits/35996nvdExploitThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/bid/74881nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-c252-xc8v-mqmmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-2067ghsaADVISORY
- web.archive.org/web/20210122162452/http://www.securityfocus.com/bid/74881ghsaWEB
News mentions
0No linked articles in our index yet.