Hackers Exploit PrestaShop Zero-Day to Steal Payment Data from Online Stores

News

Malicious actors are exploiting a previously unknown security flaw in the open source PrestaShop e-commerce platform to inject malicious skimmer code designed to swipe sensitive information.

“Attackers have found a way to use a security vulnerability to carry out arbitrary code execution in servers running PrestaShop websites,” the company noted in an advisory published on July 22.

PrestaShop is marketed as the leading open-source e-commerce solution in Europe and Latin America, used by nearly 300,000 online merchants worldwide.

CyberSecurity

The goal of the infections is to introduce malicious code capable of stealing payment information entered by customers on checkout pages. Shops using outdated versions of the software or other vulnerable third-party modules appear to be the prime targets.

The PrestaShop maintainers also said it found a zero-day flaw in its service that it said has been addressed in version 1.7.8.7, although they cautioned that “we cannot be sure that it’s the only way for them to perform the attack.”

“This security fix strengthens the MySQL Smarty cache storage against code injection attacks,” PrestaShop noted. “This legacy feature is maintained for backward compatibility reasons and will be removed from future PrestaShop versions.”

The issue in question is an SQL injection vulnerability affecting versions 1.6.0.10 or greater, and is being tracked as CVE-2022-36408.

CyberSecurity

Successful exploitation of the flaw could enable an attacker to submit a specially crafted request that grants the ability to execute arbitrary instructions, in this case, inject a fake payment form on the checkout page to gather credit card information.

The development follows a wave of Magecart attacks targeting restaurant ordering platforms MenuDrive, Harbortouch, and InTouchPOS, leading to the compromise of at least 311 restaurants.

Products You May Like

Articles You May Like

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe
Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters
WithSecure Reveals Mass Exploitation of Edge Software and Infrastructure Appliances
Phishing Attacks Targeting US and European Organizations Double
WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

Leave a Reply

Your email address will not be published. Required fields are marked *