A recently patched SQL injection flaw affecting the popular open-source e-commerce platform Magento is being actively exploited by attackers, so if you haven’t implemented the provided security update or patch, now is the time to do it.
More about Magento PRODSECBUG-2198
The flaw still doesn’t have a CVE number, but is identified as PRODSECBUG-2198 by the Magento security team.
“An unauthenticated user can execute arbitrary code through an SQL injection vulnerability, which causes sensitive data leakage,” the team explained.
The bug affects Magento Open Source prior to 22.214.171.124, Magento Commerce prior to 126.96.36.199, Magento 2.1 prior to 2.1.17, Magento 2.2 prior to 2.2.8, and Magento 2.3 prior to 2.3.1.
Administrators of Magento-based sites are advised to upgrade to Magento Open Source 188.8.131.52 or Magento Commerce 184.108.40.206 (if not, to implement the SUPEE-11086 bundle of patches), Magento 2.2.8, or Magento 2.3.1.
“Cloud customers can upgrade ECE-Tools to version 2002.0.17 to get this vulnerability in core application patched automatically. Infrastructure team added measures to block any currently known ways to exploit the vulnerability by adding additional WAF rules, which are deployed globally,” the team pointed out.
“Even though we have blocked known ways to exploit vulnerability, we strongly recommend to either upgrade ECE-Tools or apply the patch through m2-hotfixes.”
PRODSECBUG-2198 was discovered and reported by Charles Fol, a security engineer at Ambionics, and the security updates and patches were released two weeks ago (on March 26).
The exploitation attempts have apparently been fueled by the publication of a PoC exploit and additional vulnerability information a few days after the patches’ release. But, it’s also possible for aspiring attackers to reverse-engineer the patch to create a working exploit (as did Sucuri, for internal testing and monitoring).
Aside from this flaw, the security updates provided by Magento fixed another 36 issues, some of them critical.