New ‘PolyShell’ flaw allows unauthenticated RCE on Magento e-stores
好的,我现在需要帮用户总结一篇关于PolyShell漏洞的文章,控制在100字以内。首先,我得通读整篇文章,抓住关键点。 文章开头提到PolyShell漏洞影响了所有Magento Open Source和Adobe Commerce 2.x版本,允许未经认证的代码执行和账户接管。这是一个严重的安全问题,需要特别注意。 接下来,文章指出虽然目前没有迹象表明该漏洞被积极利用,但安全公司Sansec警告说攻击方法已经在流传,预计很快会有自动化攻击。这说明漏洞的风险很高,可能很快就会被利用。 然后,Adobe发布了修复补丁,但只在2.4.9的第二个alpha版本中可用,生产版本仍然暴露。这可能意味着很多用户无法立即应用补丁,需要采取其他措施。 Sansec提到Adobe提供了一个样本配置来限制影响,但大多数商店依赖于主机提供商的设置。这可能意味着很多商店无法自行调整配置,增加了风险。 文章还解释了漏洞的根源在于Magento的REST API接受文件上传作为购物车项目的自定义选项。当产品选项类型为“file”时,服务器会处理包含base64编码文件数据的对象,并将其写入特定目录。这可能导致远程代码执行或XSS攻击。 PolyShell的名字来源于它使用的一种多语种文件,可以同时作为图片和脚本。这增加了攻击的隐蔽性和多样性。 最后,建议商店管理员限制对上传目录的访问、验证服务器规则、扫描恶意软件等措施。同时提到BleepingComputer联系Adobe询问补丁发布时间但未得到回复。 总结这些关键点:漏洞名称、影响范围、攻击方式、修复情况、风险状态以及建议措施。确保在100字以内准确传达这些信息。 </think> PolyShell漏洞影响所有Magento Open Source和Adobe Commerce 2.x版本,允许未认证代码执行和账户接管。该漏洞源于REST API接受文件上传至pub/media/custom_options/目录,并可利用多语种文件实现远程代码执行或XSS攻击。Adobe已发布修复补丁但仅适用于测试版本,建议商家限制访问上传目录并扫描恶意软件以缓解风险。 2026-3-19 20:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

A newly disclosed vulnerability dubbed 'PolyShell' affects all Magento Open Source and Adobe Commerce stable version 2 installations, allowing unauthenticated code execution and account takeover.

There are no signs of the issue being actively exploited in the wild, but eCommerce security company Sansec warns that "the exploit method is circulating already" and expects automated attacks to start soon.

Adobe has released a fix, but it is only available in the second alpha release for version 2.4.9, leaving production versions vulnerable. Sansec says that Adobe offers  a "sample web server configuration that would largely limit the fallout," but most stores rely on a setup from their hosting provider.

In a report this week, Sansec says that the security problem is rooted in Magento's REST API accepting file uploads as part of the custom options for the cart item.

"When a product option has type 'file', Magento processes an embedded file_info object containing base64-encoded file data, a MIME type, and a filename. The file is written to pub/media/custom_options/quote/ on the server," the researchers explain.

Sansec says “PolyShell” is named after its use of a polyglot file that can behave as both an image and a script.

Depending on the web server configuration, the flaw can enable remote code execution (RCE) or account takeover via stored XSS, impacting most of the stores Sansec analyzed.

“Sansec investigated all known Magento and Adobe Commerce stores and found that many stores expose files in the upload directory.”

Until Adobe releases the patch to production versions, store administrators are recommended to take the following actions:

  • Restrict access to pub/media/custom_options/
  • Verify that nginx or Apache rules actually prevent access there
  • Scan stores for uploaded shells, backdoors, or other malware

BleepingComputer has contacted Adobe to ask about when a security update for PolyShell will be made available, but we have not heard back as of publishing.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores/
如有侵权请联系:admin#unsafe.sh