Threat actors are targeting websites using open source e-commerce platform PrestaShop by exploiting a zero-day flaw, tracked as CVE-2022-36408, that can allow to execute arbitrary code and potentially steal customers’ payment information.
PrestaShop is currently used by 300,000 shops worldwide and is available in 60 different languages.
The vulnerability affects PrestaShop versions 1.6.0.10 or later and versions 1.7.8.2 or later running modules vulnerable to SQL injection (i.e. Wishlist 2.0.0 to 2.1.0 module).
“The maintainer team has been made aware that malicious actors are exploiting a combination of known and unknown security vulnerabilities to inject malicious code in PrestaShop websites, allowing them to execute arbitrary instructions, and potentially steal customer’s payment information.” reads the advisory published by the maintainers at PrestaShop. “While investigating this attack, we found a previously unknown vulnerability chain that we are fixing.”
Threat actors are targeting online shops running outdated software or modules, or third-party modules affected by known vulnerabilities or zero-day flaws.
Below is the attack chain reconstructed by the experts investigating the attacks:
Once the attackers have taken over the online store, they injected a fake payment form on the front-office checkout page to steal credit card information when visitors make purchases.
The researchers provided indicators of compromises for these attacks, such as the activation of the MySQL Smarty cache storage.
“Be aware that not finding this pattern on your logs doesn’t necessarily mean that your shop has not been affected by the attack: the complexity of the exploit means that there are several ways of performing it, and attackers might also try and hide their tracks.” concludes the report.
Suggest an edit to this article
Go to Cybersecurity Knowledge Base
Got to the Latest Cybersecurity News
Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.
Remember, CyberSecurity Starts With You!
This post was last modified on 26 July 2022 9:42 AM
British high street chain WH Smith has recently revealed that it was hit by a…
As banks worldwide roll out Voice ID as a means of user authentication over the…
In the era of digital transformation, cybersecurity has become a major concern for businesses. When…
In today's digital age, cybersecurity threats have become a significant concern for businesses of all…
The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…
One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…
Leave a Comment