Phishing gone: eBay patches to block session-jacking Magento holes

Vulnerability Lab researcher Hadji Samir says eBay has squashed three vulnerabilities in its Magento shopping platform that could permit session hijacking and man-in-the-middle attacks.

The penetration tester disclosed this month the vulnerabilities along with proof-of-concept videosshowing how attackers could steal session data and phish users.

Samir says the holes include a persistent input validation web vulnerabiility, a cross-site scripting (XSS)hole, and a cross-site request forgery (CSRF) bug.

Phishing gone: eBay patches to block session-jacking Magento holes

Phishing gone: eBay patches to block session-jacking Magento holes

“The [inject] vulnerability allows remote attackers to inject own script code to the application-side of the affected service module … successful exploitation of the application-side vulnerability results in session hijacking, persistent phishing, persistent external redirects and persistent manipulation affected or connected module context,” Samir says.

“Remote [XSS] attackers are able to inject own script codes to client-side application requests.

“The [CSRF] attacker can for example intercept the session to delete all existing messages.”

Samir says the three vulnerabilities ranked as medium flaws attracting a security score averaging three.

He notes that the CSRF hole in phpbb was disclosed “some years ago”.

Each was disclosed in March under the online tat bazaar’s bug bounty program which paid out undisclosed monetary rewards and patched last month.

Source:http://www.theregister.co.uk/

Advertisements

About webimprint

Webimprints is the leading company which provides global information security services to the client around the World.
This entry was posted in Cyber Security, Vulnerabilidad and tagged , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s