Monday, 24 July 2017

Check Point finds vulnerability in eBay e-commerce platform

Check Point
Tuesday 21 April 15

Check Point Software Technologies Ltd., the largest pure-play security vendor globally, today announced that their Malware and Vulnerability Research Group recently discovered a critical RCE (remote code execution) vulnerability in eBay’s Magento web ecommerce platform…

Check Point Software Technologies Ltd., the largest pure-play security vendor globally, today announced that their Malware and Vulnerability Research Group recently discovered a critical RCE (remote code execution) vulnerability in eBay’s Magento web ecommerce platform, affecting nearly two hundred thousand online shops.

If exploited, the vulnerability gives the attacker the ability to fully compromise any online store based on the Magento platform, including credit card information and other customer financial and personal data. The vulnerability allows any attacker to bypass all security mechanisms and gain control of the store and its complete database, allowing credit card theft or any other administrative access into the system.

“As online shopping continues to overpower in-store shopping, ecommerce sites are increasingly targeted by hackers as they have become a gold mine for credit card information,” said Shahar Tal, Malware and Vulnerability Research Manager at Check Point Software Technologies. “The vulnerability we uncovered represents a significant threat not to just one store, but to all of the retail brands that use the Magento platform for their online stores – which represents about 30% of the ecommerce market.”

Check Point privately disclosed these vulnerabilities together with a list of suggested fixes to eBay prior to public disclosure. A patch to address the flaws was released on February 9, 2015 (SUPEE-5344 available here). Store owners and administrators are urged to apply the patch immediately.

Check Point customers are already protected from exploitation attempts of this vulnerability through the IPS software blade. For more information, please visit our blog.

Check Point’s Threat Intelligence & Research divisions regularly investigate attacks, vulnerabilities and breaches, and develop protections to secure Check Point’s customers. For more information on other research findings from Check Point, visit: http://www.checkpoint.com/threatcloud-central/.


View more of the latest press releases from across the industry or post your company's news.

Please enable JavaScript to view the comments powered by Disqus.

Newsletter signup

Quickly get on board and up to date with the telecoms industry