The right URL and seconds to spare | xxxThe right URL and seconds to spare – xxx
菜单

The right URL and seconds to spare

七月 30, 2019 - BleepingComputer

The right URL and seconds to spare

OXID e-commerce platform today released an update for its software fixing a remote takeover vulnerability that can be exploited without authentication.

The online shop has over 500,000 downloads and is a popular solution in Germany, used by big names like Mercedes to sell used car parts that have been tested and come with a warranty.

The right URL and seconds to spare

An attacker would need mere seconds to leverage the security flaw in OXID eShop software and get full access to the administration panel of a vulnerable site.

This is possible by using a specially crafted URL, the company says in the security bulletin, with no interaction with the victim.

Credited for the discovery of the flaw, now tracked as CVE-2019-13026, are researchers from web application security company RIPS Tech, who disclosed the bug responsibly.

In a conversation with BleepingComputer, a spokesperson for RIPS Tech said that the researchers have created “a fully working Python2.7 exploit which can compromise the OXID eShops directly;” the attacker would only need to provide the URL of the target.

To demonstrate their finding, the researchers shared a video showing how quickly a threat actor could get access to the OXID eShop administration panel.

With a severity score of 7.5, the security flaw can be exploited on OXID eShop websites running with a default configuration and could allow access to shopping cart options, customer data, and the site’s database.

Patch and workaround are available

All editions of OXID eShop (Enterprise, Professional, Community) are affected, versions 6.0.0 through 6.0.4, and 6.1.0 through 6.1.3. The developer patched the bug in OXID eShop 6.0.5 and 6.1.4, respectively.

Administrators are advised to update their installations immediately. If this is not possible, a temporary solution is available, by editing the source/.htaccess file to include the following rewrite rules after RewriteBase, line 4:

RewriteCond %{QUERY_STRING} /bsorting=[^/&/=]*[^a-z]+[^/&/=]*(/&|$) [NC] RewriteRule .* - [F]

Versions of the software that are no longer supported will remain vulnerable, as the company will not provide a fix for them.

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51