• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

4 Features That Make Your iPhone More Than an App Launcher

March 14, 2026

Xiaomi Pad 8 review: Versatile value

March 13, 2026

How to Easily Fix Video Sound

March 12, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Retail software firm PrestaShop warns users about SQL injection attacks
Tech News

Retail software firm PrestaShop warns users about SQL injection attacks

July 27, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Romance scammers exploit Ukraine war in cynical campaign
Share
Facebook Twitter LinkedIn Pinterest Email

PrestaShop, a developer of open supply e-commerce software program utilized by tons of of 1000’s of small, unbiased retailers because the foundations of their on-line presence, has warned of a critical vulnerability that, left unaddressed, would enable attackers to attain arbitrary code execution and steal buyer card information.

Tracked as CVE-2022-36408, the vulnerability first got here to gentle when PrestaShop was made conscious that cyber criminals have been exploiting “a mix of recognized and unknown safety vulnerabilities” to inject malicious code into web sites counting on the platform.

In the midst of this investigation, its group discovered a beforehand unknown vulnerability chain affecting – to one of the best of the agency’s information – retailers constructed on variations 1.6.8.10 or greater which can be weak to SQL injection assaults. Word that variations 1.7.8.2 and above aren’t weak until operating modules or customized code that itself features a SQL injection vulnerability.

“The assault requires the store to be weak to SQL injection exploits. To one of the best of our information, the most recent model of PrestaShop and its modules are free from these vulnerabilities. We consider attackers are focusing on retailers utilizing outdated software program or modules, weak third-party modules, or a yet-to-be-discovered vulnerability,” mentioned PrestaShop in an advisory printed on 22 July.

Regardless of this uncertainty, its investigations have established a recurring assault sample. First, the attacker submits a POST request to the weak endpoint. They then obtain a GET request to the homepage with out parameters, ensuing within the creation of a PHP file on the root of the store’s listing. From there, they’ll submit a GET request to that new file, permitting them to execute arbitrary code.

See also  Apple releases iOS 16.6 beta 5 ahead of upcoming iPhone software update

This completed, the attacker can then inject a pretend fee type on the sufferer’s checkout web page, enabling them to steal buyer bank card information.

“Proof displaying how the PrestaShop platform is being exploited by hackers is a stark reminder that platforms have to be up to date frequently to make sure you have the most recent safety advantages”
Michael Tanaka, Miracl

Retailers utilizing the PrestaShop platform ought to instantly ensure that their web sites and all modules are up to date to the most recent model, which ought to forestall them from being uncovered to recognized or actively exploited SQL injection bugs.

The provider added that there was an opportunity attackers have been exploiting the hardly ever used MySQL Smarty cache storage function of their assault vector (which is disabled by default however will be remotely enabled), so customers can also want to bodily disable the function in PrestaShop’s code to chop off this specific methodology.

Extra data, together with indicators of compromise (IoCs), is on the market from PrestaShop.

Chris Hauk, client privateness advocate at cyber safety steering and on-line privateness specialist Pixel Privateness, mentioned PrestaShop’s steering needs to be carried out urgently. 

“PrestaShop customers will wish to disable the function getting used for this exploit to interrupt this assault chain. This underscores the necessity for website directors to maintain their methods up to date to the most recent model of the working methods, databases and apps,” mentioned Hauk.

Michael Tanaka, chief industrial officer at multifactor authentication (MFA) provider Miracl, added: “Proof at the moment displaying how the PrestaShop platform is being exploited by hackers is a stark reminder that platforms have to be up to date frequently to make sure you have the most recent safety advantages.

“Not solely upkeep patches, but additionally new applied sciences akin to zero-knowledge proofs and protocols [ZKPs] that minimise the usage of private information will additional harden any platform in opposition to assault,” mentioned Tanaka.

 

Source link

attacks firm injection PrestaShop Retail software SQL Users Warns
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Samsung Galaxy S26 Ultra review: Iterative hardware, magical software

March 9, 2026

9 Common Scams Targeting Mac Users in 2026

February 21, 2026

Unpacking a New iPhone 17 Today? Check for Software Updates

September 19, 2025

Oppo A40 review: Absurdly cheap, but for casual users only

August 14, 2025
Add A Comment

Comments are closed.

Editors Picks

3 Ways To Get To Know Your Employees Better To Drive Engagement

July 4, 2022

OnePlus Watch 2 review

March 8, 2024

Amazon Kindle (2022) review

November 9, 2022

Federal Drug Enforcement Agents Tracked Down an Illegal Narcotics Ring with the Help of Apple’s AirTags

March 26, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

4 Features That Make Your iPhone More Than an App Launcher

Xiaomi Pad 8 review: Versatile value

How to Easily Fix Video Sound

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.