Menu
Critical vulnerabilities patched in Magento e-commerce platform

Critical vulnerabilities patched in Magento e-commerce platform

Stored XSS bugs could let hackers hijack administrative accounts

If you're running an online shop based on the Magento e-commerce platform, it's a good idea to update it as soon as possible. The latest patches fix critical vulnerabilities that could allow attackers to hijack administrative accounts.

One issue was discovered by researchers from Web security firm Sucuri and stems from improper validation of email addresses in the customer registration form.

The flaw allows a malicious user to include JavaScript code in the email field, leading to a so-called stored cross-site scripting (XSS) attack. The JavaScript code is saved along with the form and is triggered when the user account is listed in the website's back-end panel.

The issue is rated as critical because the rogue code can hijack an administrator's authenticated session or can instruct his browser to perform a rogue action on the website, such as adding another administrator account with attacker-supplied credentials.

The vulnerability affects Magento Community Edition prior to version 1.9.2.3 and Magento Enterprise Edition prior to version 1.14.2.3. Magento also released a patch bundle last week called SUPEE-7405 that can be applied to older versions.

The bundle also includes fixes for 19 other flaws, including a similar stored XSS issue in the order comments form and one in the processing of the HTTP_X_FORWARDED_FOR header for the customer's IP address. Other issues fixed include information leaks, CAPTCHA bypasses, cross-site request forgery issues, malicious file uploads and denial-of-service against the newsletter function.

Some of these flaws also affect Magento 2.x CE and EE. Version 2.0.1 was released for both editions in order to address them, along with some critical stored XSS flaws that only exist in the 2.x versions.

"If you’re using a vulnerable version of Magento, update/patch as soon as possible," said Marc-Alexandre Montpas, the Sucuri researcher who found one of the stored XSS flaws, in a blog post Friday.

According to the company that develops the e-commerce platform, Magento is used by over 200,000 companies, including many popular brand owners. A 2015 survey of the top 1 million websites by traffic found that Magento is used by around 30 percent of their online shops, making it the most popular e-commerce platform.

Magento-based websites have been the target of large-scale attacks before, so they represent an attractive target for attackers. In October, thousands of online shops running the platform were infected with the Neutrino exploit kit.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments