Attackers have been seen attempting to exploit the Magento Connect Manager application via arbitrary PHP upload. Connect Manager is integrated into the Magento admin area and provides the administrator a quick and easy method to test and install new modules. This is only available in Magento versions 1.8 and 1.9. A caveat for this exploit requires an attacker to obtain administrator credentials (users with “all” privileges also work) to the Magento instance. An attacker can retrieve credentials through various means, such as brute force credentials, social engineering, and authentication bypass vulnerability.
Exploitation
Stages
- The remote attacker authenticates to the Magento instance as an administrator or a user with “all” privileges. This could be achieved through various methods, such as brute force credentials, social engineering, and authentication bypass vulnerability.
- The server responds successfully, giving the remote attacker the appropriate cookies for authenticating to the Connect Manager interface.
- The remote attacker uploads their PHP file via the upload function in Magento Connect Manager. The upload must also contain an XML file, otherwise, the upload will not work.
- The server responds successfully, indicating that the file has been uploaded.
Prerequisites
The existing network access and admin (Magento “all” permissions) credentials are necessary.
Alert Logic Coverage
Alert Logic® has evaluated its customer base for exposure to the exploit and has developed signatures for mitigating the threat depending on the security service in place.
The Network-Based Intrusion Detection System (IDS) has been updated with the new signatures for this exploit when detected via Alert Logic Threat Manager™. If this signature is detected, an incident is generated in the Alert Logic console.
Recommendations for Mitigation
Upgrade to a non-vulnerable version to mitigate this vulnerability.
Comments
0 comments
Please sign in to leave a comment.