OXID eShop eCommerceOXID eShop eCommerce

If your e-commerce website runs on the OXID eShop
platform
, you need to update it immediately to prevent your
site from becoming compromised.

Cybersecurity researchers have discovered a pair of critical
vulnerabilities in OXID eShop e-commerce software that could allow
unauthenticated attackers to take full control over vulnerable
eCommerce websites remotely in less than a few seconds.

OXID eShop is one of the leading German e-commerce shop software
solutions whose enterprise edition is being used by industry
leaders including Mercedes, BitBurger, and Edeka.

Security researchers at RIPS Technologies GmbH shared their latest findings with
The Hacker News, detailing about two critical security
vulnerabilities that affect recent versions of Enterprise,
Professional, and Community Editions of OXID eShop software.

It should be noted that absolutely no interaction between the
attacker and the victim is necessary to execute both
vulnerabilities, and the flaws work against the default
configuration of e-commerce software.

OXID eShop: SQL Injection Flaw

The first vulnerability, assigned as CVE-2019-13026, is a SQL
injection vulnerability that allows an unauthenticated attacker to
simply create a new administrator account, with a password of his
own choice, on a website running any vulnerable version of OXID
eShop software.

“An unauthenticated SQL injection can be exploited when viewing the
details of a product. Since the underlying database makes use of
the PDO database driver, stacked queries can be used to INSERT data
into the database. In our exploit we abuse this to INSERT a new
admin user,” researchers told The Hacker News.

Here’s Proof-of-Concept video researchers shared with The Hacker
News, demonstrating this attack: Though the PDO database system has
been designed to prevent SQL injection attacks using prepared
statements, using dynamically build SQL commands could leave
stacked queries at higher risk of getting tainted.

OXID eShop: Remote Code Execution Flaw

The second vulnerability is a PHP Object injection issue, which
resides in the administration panel of the OXID eShop software and
occurs when user-supplied input is not properly sanitized before
being passed to the unserialize() PHP function.
This vulnerability can be exploited to gain remote code execution
on the server; however, it requires administrative access which can
be obtained using the first vulnerability.

“A second vulnerability can then be chained to gain remote code
execution on the server. We have a fully working Python2.7 exploit
which can compromise the OXID eShops directly which requires only
the URL as an argument,” researchers told The Hacker News.

Here’s the video demonstration showing the RCE attack in action:
Once successful, attackers can remotely execute malicious code on
the underlying server, or install their own malicious plugin to
steal users’ credit cards, PayPal account information and any
highly sensitive financial information that passes through the
eShop system—just like MageCart
attacks
.

RIPS researchers responsibly reported their findings to OXID
eShops, and the company acknowledged the issue and addressed[3] it with the release of
OXID eShop v6.0.5 and 6.1.4 for all three Editions.

It appears that the company did not patch the second
vulnerability, but simply mitigated it by addressing the first
issue. However, in the future, if any admin takeover issue is
discovered, it will revive the RCE attacks.

[1][2]

References

  1. ^
    latest findings
    (blog.ripstech.com)
  2. ^
    MageCart attacks
    (thehackernews.com)
  3. ^
    addressed
    (oxidforge.org)

Read more