Stored XSS bugs could let hackers hijack administrative accounts If you’re running an online shop based on the Magento e-commerce platform, it’s a good idea to update it as soon as possible. The latest patches fix critical vulnerabilities that could allow attackers to hijack administrative accounts. One issue was discovered by researchers from Web security firm Sucuri and stems from improper validation of email addresses in the customer registration form. The flaw allows a malicious user to include JavaScript code in the email field, leading to a so-called stored cross-site scripting (XSS) attack. The JavaScript code is saved along with the form and is triggered when the user account is listed in the website’s back-end panel. The issue is rated as critical because the rogue code can hijack an administrator’s authenticated session or can instruct his browser to perform a rogue action on the website, such as adding another administrator account with attacker-supplied credentials. The vulnerability affects Magento Community Edition prior to version 1.9.2.3 and Magento Enterprise Edition prior to version 1.14.2.3. Magento also released a patch bundle last week called SUPEE-7405 that can be applied to older versions. The bundle also includes fixes for 19 other flaws, including a similar stored XSS issue in the order comments form and one in the processing of the HTTP_X_FORWARDED_FOR header for the customer’s IP address. Other issues fixed include information leaks, CAPTCHA bypasses, cross-site request forgery issues, malicious file uploads and denial-of-service against the newsletter function. Some of these flaws also affect Magento 2.x CE and EE. Version 2.0.1 was released for both editions in order to address them, along with some critical stored XSS flaws that only exist in the 2.x versions. “If you’re using a vulnerable version of Magento, update/patch as soon as possible,” said Marc-Alexandre Montpas, the Sucuri researcher who found one of the stored XSS flaws, in a blog post Friday. According to the company that develops the e-commerce platform, Magento is used by over 200,000 companies, including many popular brand owners. A 2015 survey of the top 1 million websites by traffic found that Magento is used by around 30 percent of their online shops, making it the most popular e-commerce platform. Magento-based websites have been the target of large-scale attacks before, so they represent an attractive target for attackers. In October, thousands of online shops running the platform were infected with the Neutrino exploit kit. Related content analysis BGP: What is border gateway protocol, and how does it work? BGP is how the autonomous networks that make up the internet share routing information to find the best route for IP traffic. CISA describes BGP as 'the most important part of the internet you’ve probably never heard of.' By Keith Shaw May 17, 2024 11 mins Routers Internet Network Security feature Red Hat seeks to be the platform for enterprise AI By Maria Korolov May 17, 2024 12 mins Linux Network Management Software news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 4 mins Regulation Network Security brandpost Sponsored by Zscaler 5 Must-haves for your next DSPM solution Elevating cloud security: Navigating the data storm with DSPM By Kalie Radsmikham, Sr. Director of Product Marketing, Cloud Security May 16, 2024 7 mins Cloud Computing PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe