Menu
Critical vulnerabilities patched in Magento e-commerce platform

Critical vulnerabilities patched in Magento e-commerce platform

Stored XSS bugs could let hackers hijack administrative accounts

If you're running an online shop based on the Magento e-commerce platform, it's a good idea to update it as soon as possible. The latest patches fix critical vulnerabilities that could allow attackers to hijack administrative accounts.

One issue was discovered by researchers from Web security firm Sucuri and stems from improper validation of email addresses in the customer registration form.

The flaw allows a malicious user to include JavaScript code in the email field, leading to a so-called stored cross-site scripting (XSS) attack. The JavaScript code is saved along with the form and is triggered when the user account is listed in the website's back-end panel.

The issue is rated as critical because the rogue code can hijack an administrator's authenticated session or can instruct his browser to perform a rogue action on the website, such as adding another administrator account with attacker-supplied credentials.

The vulnerability affects Magento Community Edition prior to version 1.9.2.3 and Magento Enterprise Edition prior to version 1.14.2.3. Magento also released a patch bundle last week called SUPEE-7405 that can be applied to older versions.

The bundle also includes fixes for 19 other flaws, including a similar stored XSS issue in the order comments form and one in the processing of the HTTP_X_FORWARDED_FOR header for the customer's IP address. Other issues fixed include information leaks, CAPTCHA bypasses, cross-site request forgery issues, malicious file uploads and denial-of-service against the newsletter function.

Some of these flaws also affect Magento 2.x CE and EE. Version 2.0.1 was released for both editions in order to address them, along with some critical stored XSS flaws that only exist in the 2.x versions.

"If you’re using a vulnerable version of Magento, update/patch as soon as possible," said Marc-Alexandre Montpas, the Sucuri researcher who found one of the stored XSS flaws, in a blog post Friday.

According to the company that develops the e-commerce platform, Magento is used by over 200,000 companies, including many popular brand owners. A 2015 survey of the top 1 million websites by traffic found that Magento is used by around 30 percent of their online shops, making it the most popular e-commerce platform.

Magento-based websites have been the target of large-scale attacks before, so they represent an attractive target for attackers. In October, thousands of online shops running the platform were infected with the Neutrino exploit kit.


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments