Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento shops have been hacked by malicious actors by exploiting a safety vulnerability dubbed CosmicSting.
Tracked as CVE-2024-34102 (CVSS rating: 9.8), the important flaw pertains to an improper restriction of XML exterior entity reference (XXE) vulnerability that might end in distant code execution. The shortcoming, credited to a researcher named “spacewasp,” was patched by Adobe in June 2024.
Dutch safety agency Sansec, which has described CosmicSting because the “worst bug to hit Magento and Adobe Commerce stores in two years,” stated the e-commerce websites are being compromised on the fee of three to 5 per hour.
The flaw has since come underneath widespread exploitation, prompting the U.S. Cybersecurity and Infrastructure Safety Company (CISA) so as to add it to the Recognized Exploited Vulnerabilities (KEV) catalog in mid-July 2024.
A few of these assaults contain weaponizing the flaw to steal Magento’s secret encryption key, which is then used to generate JSON Internet Tokens (JWTs) with full administrative API entry. The menace actors have then been noticed making the most of the Magento REST API to inject malicious scripts.
This additionally implies that making use of the newest repair alone is inadequate to safe in opposition to the assault, necessitating that web site homeowners take steps to rotate the encryption keys.
Subsequent assaults noticed in August 2024 have chained CosmicSting with CNEXT (CVE-2024-2961), a vulnerability within the iconv library inside the GNU C library (aka glibc), to attain distant code execution.
“CosmicSting (CVE-2024-34102) allows arbitrary file reading on unpatched systems. When combined with CNEXT (CVE-2024-2961), threat actors can escalate to remote code execution, taking over the entire system,” Sansec famous.
The top aim of the compromises is to ascertain persistent, covert entry on the host through GSocket and insert rogue scripts that enable for the execution of arbitrary JavaScript acquired from the attacker with a view to steal fee information entered by customers on the websites.
The most recent findings present that a number of corporations, together with Ray Ban, Nationwide Geographic, Cisco, Whirlpool, and Segway, have fallen sufferer to CosmicSting assaults, with no less than seven distinct teams partaking within the exploitation efforts –
- Group Bobry, which makes use of whitespace encoding to cover code that executes a fee skimmer hosted on a distant server
- Group Polyovki, which makes use of an injection from cdnstatics.internet/lib.js
- Group Surki, which makes use of XOR encoding to hide JavaScript code
- Group Burunduki, which accesses a dynamic skimmer code from a WebSocket at wss://jgueurystatic[.]xyz:8101
- Group Ondatry, which makes use of customized JavaScript loader malware to inject bogus fee types that mimic the respectable ones utilized by the service provider websites
- Group Khomyaki, which exfiltrates fee info to domains that embrace a 2-character URI (“rextension[.]net/za/”)
- Group Belki, which makes use of CosmicSting with CNEXT to plant backdoors and skimmer malware
“Merchants are strongly advised to upgrade to the latest version of Magento or Adobe Commerce,” Sansec stated. “They should also rotate secret encryption keys, and ensure that old keys are invalidated.”