Learn more information about the Shoplift Bug, how it makes your system vulnerable, and what you need to do to combat it.
In early 2015, Magento found a vulnerability known as Shoplift Bug and released a patch for it. Unfortunately, many businesses still haven’t patched this vulnerability, which could threaten their e-commerce integrity.
Here is some more information about the Shoplift Bug, how it makes your system vulnerable, and what you need to do to combat it.
See also: How do Hackers Hack?
Through the Shoplift Bug, hackers can remotely execute code on Magento software. This vulnerability seems to affect both the community and enterprise versions of Magento.
The Shoplifting exploit is actually a chain of vulnerabilities in the Magento core software, but is frighteningly simple. The exploit uses a Python script that forces the server to downgrade the website from HTTPS to HTTP and then uses SQL injection to create a new user with administrative privileges.
Once the attacker has access to the dashboard with administrator access, they will typically install software through the console that will create a backdoor that allows the attacker to remotely alter the functionality of the online store, add or remove products, change the price of products, add phony coupons, and much more.
Unfortunately, this exploit was highly automated and nearly all vulnerable instances of the Magento dashboard are assumed to be compromised. If you don’t know if you’ve patched your site recently or if you’re a Magento user, check on MageReport.com.
If you haven’t installed this patch, here’s a list of steps you should take to patching your website:
If you need help installing patches, refer to Magento’s Community Security patch forum where community members, moderators, and Magento can assist with questions about downloading and installing patches.
If you haven’t already installed this latest patch, you should do so as soon as possible.
Remember, it’s important to stay up to date on your systems and patch any vulnerabilities that pop up. Tips to do this include:
See also: Security Patches in Your Business: Complying with PCI Requirement 6.