Adobe Commerce and Magento Open Source have been targeted in a recent wave of attacks that exploit a critical vulnerability. Threat researchers at Sansec released a report this week that details the methodology of this remote access trojan attack. The vulnerability exploited in these attacks, CVE-2022-24086, was found to be actively exploited as early as February this year. A patch was originally released by Adobe at that time, however since then additional patches have also been released to cover further security protections needed to fully patch this flaw.
CVE-2022-24086 is a critical severity vulnerability that has been given a CVSS base score rating of 9.8/10. The flaw occurs when a new customer account is created, and an order is placed but an input validation error within the checkout process causes failed payment. A background process is launched during this, which is a remote access trojan (RAT). This RAT can bypass Abode security features and be injected into other nodes within the same multi-server cluster environment. Two other exploit processes also exist for this vulnerability. The first of these involved the injection of a health_check.php backdoor into the sales order, while the other attack variation involves malicious code injection to replace expected code and create a similar PHP eval backdoor. All of these attacks do not require user interaction and can result in the attacker executing arbitrary code in the target environment.
The Cybersecurity and Infrastructure Security Agency (CISA), a branch of the US government, added this vulnerability to their Known Exploited Vulnerabilities Catalog in February, and issued an alert to request all organisations, and especially those involved with the US federal government, to updated and patch these vulnerabilities immediately. Individuals and organisations who currently use Adobe Commerce and Magento Open Source versions 2.3.3-p1 – 2.3.7-p2 and 2.4.0 – 2.4.3-p1 or earlier should apply the available security patches as soon as possible. Guidance on how to do this can be found on the Adobe Commerce Help Center website.
“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”
Aim Ltd Chief Technology Officer (CTO)