Magento e-Commerce sites get security updates for severe code execution bugs
A critical vulnerability in Magento e-Commerce platform can allow for arbitrary code execution when exploited by threat actors. Adobe released security updates today to fix three security flaws affecting Magento Commerce and Magento Open Source.
Affected software includes versions 2.3.5-p1 and earlier of both Magento Commerce and Magento Open Source.
Store owners with impacted Magento sites should upgrade to Magneto 2.4.0 or upgrade to Magento Commerce or Magento Open Source 2.3.5-p2.
The first flaw is critical and tracked as CVE-2020-9689 in the national database of Common Vulnerabilities and Exposures. It can allow threat actors to run arbitrary computer code on the server when exploited. The security flaw is still listed as reserved in the CVE database and further details will become available when enough sites have been updated and secured.
The other two security bugs, CVE-2020-9690 and CVE-2020-9691, are listed as important. CVE-2020-9690 can allow signature verification bypass and CVE-2020-9691 can also allow arbitrary cod execution.
Currently, there are no known attacks that exploit any of these three security bugs.
Security Risks for Magento Sites
The Federal Bureau of Investigations (FBI) has warned governmental agencies and businesses to defend against MageCart attacks in and encourages e-Commerce site owners to keep their stores updated with security patches.
MageCart attacks steal payment information from Magento e-Commerce sites. Threat actors inject malicious computer code and use it to steal payment card information from shoppers as they move through an online checkout. Neither the Magento website owner nor the customer is aware that the threat actors are stealing payment cards. MageCart malware is in use by a number of hacking organizations.
Hackers infect a website with MageCart malware by exploiting security bugs or by compromising third-party vendors or website integrations when they are not kept up to date.
Websites belonging to jewelry retailer Claire’s and its subsidiary Icing were attacked by MageCart malware from April 30 and June 13 of this year. Earlier this month, a North Korean advanced persistent threat group, called Lazarus Group, was found to be attacking major online retailers with MageCart. The attacks started approximately in May 2019.
Credit card skimming can impact any e-Commerce website as well as physical point-of-sale (POS) terminals at retail locations.
Credit card skimming isn’t the only kind of cyber attack that can impact an e-Commerce website. Threat actors can attack any server with the type of cyber attack known as a distributed denial of service, or DDoS attack. In this attack, attackers flood a server with many requests for information. The server begins to respond slowly or possibly becomes disabled because it was not designed to handle so much work. For example, the DDoS attack may use malicious computer code and a botnet and request web pages at the rate of thousands per second. This would result in a high server workload that would render a website slow and unable to serve webpages to human visitors.
Magento 1 Sunset
The first generation of Magento software, Magento 1.X, reached its end of life on June 30, 2020. All versions Magento prior to version 2.0 are sunsetted, meaning there will be no more security patches or upgrades. Although stores running Magento 1.X will continue to run for now, they can become incompatible with addons and third-party integrations.
Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers