April 2, 2015 By Shane Schick 2 min read

A pair of eBay vulnerabilities could have left users of the popular online auction site open to malware and drive-by download attacks, according to the security researcher who discovered and reported them.

In an email sent to Threatpost, Aditya Sood said one of the eBay vulnerabilities involved a failure to ensure malware wasn’t camouflaged within the image extensions of a file, but that in itself wasn’t the biggest issue. More importantly, cybercriminals could also potentially use URLs generated by uploading malware in drive-by attacks due to the fact that eBay was returning messages with an identical file path.

As The Register pointed out, this is hardly the first time security concerns have been raised about the online auction and e-commerce service. Earlier research uncovered a way to use specially designed links to potentially take over any eBay account. The company has apparently learned some lessons from that incident. While BBC News said that cross-site scripting vulnerability apparently persisted for much of 2014 before it was finally addressed, a spokesperson told EcommerceBytes the current eBay vulnerabilities have already been fixed.

Beyond problems with its public-facing sites, eBay was also mentioned in coverage of a PandaLabs security report on ITProPortal that showed how much worse security issues have become over the past year. The story recalled an incident last year in which stolen employee credentials led to a massive data breach of customer passwords; some might argue those types of insider threats are the most dangerous of all.

In the meantime, it’s interesting that eBay vulnerabilities are being discovered just as the company is planning to formally separate from PayPal. Although the online payment platform has had its own security issues in the past, including a financial phishing scheme, PayPal recently said it was going to beef up its own data protection capabilities by acquiring CyActive, a startup whose products are designed to predict how malware will evolve. According to Reuters, PayPal has already set up a security operations center near CyActive’s home base in Israel.

Although it doesn’t look like anyone was affected by the recent eBay vulnerabilities, it’s a good reminder for similar online companies to be vigilant, as a story on Effect Hacking suggested. If cybercriminals had exploited these flaws, all it would take is looking at an image with embedded malware to launch a cyberattack. That won’t just stop customers from shopping — it will likely stop them from ever returning to the site again.

Image Source: iStock

More from

How cyber criminals are compromising AI software supply chains

3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important.Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to be a hacktivist organization motivated by an anti-AI cause, specifically targets these resources to poison data sets used in AI model training.No matter whether you use…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Getting “in tune” with an enterprise: Detecting Intune lateral movement

13 min read - Organizations continue to implement cloud-based services, a shift that has led to the wider adoption of hybrid identity environments that connect on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices in these hybrid identity environments, Microsoft Intune (Intune) has emerged as one of the most popular device management solutions. Since this trusted enterprise platform can easily be integrated with on-premises Active Directory devices and services, it is a prime target for attackers to abuse for conducting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today