{"id":34262,"date":"2024-06-24T09:07:51","date_gmt":"2024-06-24T07:07:51","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=34262"},"modified":"2024-06-24T09:07:51","modified_gmt":"2024-06-24T07:07:51","slug":"cosmicsting-vulnerability-cve-2024-34102-put-adobe-commerce-and-magento-stores-at-risk","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/06\/24\/cosmicsting-vulnerability-cve-2024-34102-put-adobe-commerce-and-magento-stores-at-risk\/","title":{"rendered":"CosmicSting: Vulnerability CVE-2024-34102 put Adobe Commerce and Magento stores at risk"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/06\/24\/cosmicsting-schwachstelle-cve-2024-34102-gefhrdet-adobe-commerce-und-magento-shops\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Small addendum from last week. It has been known since the middle of the month that the vulnerability CVE-2024-34102 exists in Adobe Commerce and Magento online stores. Together with a Linux vulnerability, thousands of stores can be taken over by attackers. A fix has been available for a few days, but the majority of online stores are still running unpatched versions.<\/p>\n<p><!--more--><\/p>\n<h2>Vulnerability CVE-2024-34102<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/de4022d1c5a04a9b8fe403814321322a\" alt=\"\" width=\"1\" height=\"1\" \/>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier versions are affected by the vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-34102\" target=\"_blank\" rel=\"noopener\">CVE-2024-34102<\/a>. An XML External Entity Reference (\"XXE\") could allow the execution of arbitrary code. An attacker could exploit this vulnerability by sending a manipulated XML document that refers to external entities. No user interaction is required to exploit this issue. A CVS 3.1 score of 9.8 has now been assigned &#8211; the vulnerability is therefore critical.<\/p>\n<p>CosmicSting (CVE-2024-34102) is the worst flaw to appear in Magento and Adobe Commerce in two years. It allows anyone to read private files (e.g. those containing passwords) without authorization. However, when combined with the recent iconv bug in Linux, it turns into the security nightmare of remote code execution. This killer bug gives attackers full control, and the attack can be automated, leading to mass hacks on a global scale.<\/p>\n<h2>There is an update<\/h2>\n<p>Adobe has already published the security warning <a href=\"https:\/\/helpx.adobe.com\/security\/products\/magento\/apsb24-40.html\" target=\"_blank\" rel=\"noopener\">APSB24-40<\/a> on June 11, 2024. Adobe has released a security update for Adobe Commerce, Magento Open Source and the Adobe Commerce Webhooks plugin. This update fixes the above-mentioned vulnerability, which is classified as critical, as well as other important vulnerabilities.\u202fDetails on the updated versions can be found in the Adobe document with the security warning.<\/p>\n<h2>Numerous unpatched online stores at risk<\/h2>\n<p>However, the update frequency of online stores (Magento etc.) set up with Adobe products is probably miserable. The <a href=\"https:\/\/sansec.io\/research\/cosmicstin\" target=\"_blank\" rel=\"noopener\">Sansec Forensics team sounded the alarm<\/a> as early as June 18, 2024. A good 75% of e-commerce stores operated with Adobe software are at risk of CosmicSting attacks. One week after the release of a critical security fix, only a quarter of all Adobe Commerce and Magento stores have been patched.<\/p>\n<p>As of June 23, 2024, Sergey Temnikov (aka spacewasp), who discovered the original problem, informed the Sansec team that third parties can get API admin access without needing a vulnerable Linux version (with the iconv problem). This makes CosmicSting even more critical. Temnikov shared his findings in the article <a href=\"https:\/\/github.com\/spacewasp\/public_docs\/blob\/main\/CVE-2024-34102.md\" target=\"_blank\" rel=\"noopener\">How I Was Paid $9,000 for a Critical Vulnerability in Adobe Commerce<\/a> and also suggested an<a href=\"https:\/\/sansec.io\/research\/cosmicsting#emergency-fix\" target=\"_blank\" rel=\"noopener\"> improved contingency solution<\/a> to mitigate the bug.<\/p>\n<p><a href=\"https:\/\/twitter.com\/HunterMapping\/status\/1804052524997185628\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"CVE-2024-34102 in Magento\" src=\"https:\/\/i.postimg.cc\/6p3wCf33\/image.png\" alt=\"CVE-2024-34102 in Magento\" \/><\/a><\/p>\n<p>Security researchers point out in the above <a href=\"https:\/\/twitter.com\/HunterMapping\/status\/1804052524997185628\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that they <a href=\"https:\/\/hunter.how\/list?searchValue=product.name%3D%22Adobe%20Magento%22\" target=\"_blank\" rel=\"noopener\">have found<\/a> more than 54,200 services that are vulnerable to attack via the CosmicSting vulnerability. Millions of online stores based on the Adobe Commerce and Magento platforms are at risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Small addendum from last week. It has been known since the middle of the month that the vulnerability CVE-2024-34102 exists in Adobe Commerce and Magento online stores. Together with a Linux vulnerability, thousands of stores can be taken over by &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/06\/24\/cosmicsting-vulnerability-cve-2024-34102-put-adobe-commerce-and-magento-stores-at-risk\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-34262","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=34262"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34262\/revisions"}],"predecessor-version":[{"id":34263,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34262\/revisions\/34263"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=34262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=34262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=34262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}