• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Attackers Could Exploit Flaws In Magmi Magento Plugin To Hijack

Attackers could exploit flaws in MAGMI Magento plugin to hijack admin sessions

You are here: Home / General Cyber Security News / Attackers could exploit flaws in MAGMI Magento plugin to hijack admin sessions
September 1, 2020

A duo of vulnerabilities found in the MAGMI Magento plugin could result in remote code execution (RCE) on vulnerable web-sites working with Magento.

The flaws in the Magento databases consumer utilized for raw bulk operations on on-line shop models had been uncovered by researcher Enguerran Gillier, a member of the Tenable Web Software Security Crew, in accordance to blog site write-up penned by Tenable scientists.

A person of the bugs is a cross-web site ask for forgery (CSRF) vulnerability in MAGMI for Magento, CVE-2020-5776, that Tenable mentioned “exists simply because the GET and Submit endpoints for MAGMI really don’t employ CSRF security.” As a end result, a miscreant could trick a Magento administration into clicking a connection as they are becoming authenticated to MAGMI. From there, attackers could hijack administrator periods and execute arbitrary code on a server in which MAGMI resides.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The other vulnerability, CVE-2020-5777, an authentication bypass vulnerability in MAGMI for Magento version .7.23 and underneath, stems from a fallback mechanism that employs default qualifications magmi:magmi. “As a consequence, an attacker could power the database link to fall short due to a databases denial of provider (DB- DoS) attack, then authenticate to MAGMI using the default qualifications,” Tenable researchers wrote.

Previous Post: «Slack Buyers Unwittingly Phished With Destructive Payloads Slack buyers unwittingly phished with destructive payloads
Next Post: CEOs Could Deal with Jail Time for IoT Attacks by 2024 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
  • When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
  • Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

Copyright © TheCyberSecurity.News, All Rights Reserved.