Adobe last week patched a total of nine vulnerabilities in its Magento e-commerce platform, including two critical issues.
The vulnerabilities rated critical have been described as a “file upload allow list bypass” that can lead to arbitrary code execution, and an SQL injection flaw that can provide an attacker read or write access to the targeted store’s database. However, exploitation of these vulnerabilities requires admin privileges, which means they need to be chained with other weaknesses.
Six of the security holes plugged last week have been rated important, including improper authorization, insufficient user session invalidation, and stored cross-site scripting (XSS) issues.
The remaining important-severity vulnerabilities can allow an attacker to modify customer lists, access restricted resources, and modify CMS pages.
The only moderate-severity flaw patched with this round of Magento updates allows an attacker with admin privileges to obtain information, specifically the document root path.
A total of six researchers have been credited by Adobe for reporting these vulnerabilities. The patches are included in versions 2.4.1 and 2.3.6 of Magento Commerce and Open Source.
Online stores powered by Magento are often targeted by cybercriminals in an effort to steal their customers’ personal and financial information.
A recent attack involved hundreds of Magento stores being hacked every day in what experts described as the largest ever skimming campaign. Magento exploits have also been used in a campaign targeting the customers of the Playback Now conference platform.