April 23, 2015 By Shane Schick 2 min read

Though a remote code execution vulnerability in Magento was recently patched, it could have left more than 200,000 online retailers open to cybercriminal attacks, according to a security researcher.

In a blog post, a member of Check Point Software Technologies’ malware and vulnerability team provided details around the vulnerability in Magento — the e-commerce platform owned by eBay — that was first discovered a few months ago. The company notified eBay shortly thereafter. Through a so-called “white hat hacking” attempt, the researcher discovered a number of flaws that could have potentially allowed cybercriminals to take over a Web server and execute PHP code. That means any store running Magento could have seen financial data such as credit card numbers stolen and cybercriminals gaining administrator-level access.

Though Check Point wasn’t aware of anyone actually exploiting the Magento vulnerability, the consequences could have been severe. According to a story on Threatpost, Magento is used by 30 percent of the e-commerce market and includes major brands such as Nike among its core customers. Thankfully, eBay took action quickly, and customers have been informed and urged to patch their systems accordingly.

Given that customers have had to contend with major cyberattacks in physical stores such as Target and Home Depot, the expectations around a safe online shopping experience have arguably never been higher. For eBay in particular, the vulnerability in Magento is just the latest in a string of security concerns. Just a few weeks ago, researchers revealed that the way eBay was handling the file path in messages could have led to drive-by attacks.

Experts told SC Magazine that if nothing else, retailers who set up shop online should start to think of their sites not merely as a way to conduct business, but rather as an endpoint that needs to be as secure as anything else they own. Besides applying the patch, it is a good idea to change admin passwords and conduct some analysis to spot any recent suspicious activity.

Although some software systems aren’t updated very often, there is a good chance those in charge of e-commerce will be vigilant about the Magento vulnerability. As Infosecurity Magazine pointed out, the product is available for free but makes use of many open-source components. That suggests it may often be customized and, therefore, those deploying it would pay attention to these types of security issues.

Image Source: iStock

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today