Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100个字以内,不需要特定的开头,直接写描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是Sansec发现了一个严重的安全漏洞,存在于Magento的REST API中。这个漏洞允许未经身份验证的攻击者上传任意可执行文件,进而实现代码执行和账户接管。漏洞被命名为PolyShell,因为攻击者将恶意代码伪装成图片。该漏洞影响了所有Magento Open Source和Adobe Commerce版本到2.4.9-alpha2。 接下来,文章提到Adobe已经在预发布版本中修复了这个问题,但当前生产版本还没有独立补丁。建议采取的措施包括限制上传目录访问、检查服务器配置规则、扫描恶意软件等。 然后,文章还提到Netcraft报告了一个针对Magento电商网站的大规模攻击活动,涉及数千个站点被破坏和篡改。但目前不清楚这些攻击是否利用了PolyShell漏洞。 现在我需要将这些信息浓缩到100字以内。关键点包括:严重漏洞、REST API、上传恶意文件、代码执行、账户接管、影响范围、修复情况、建议措施以及相关攻击活动。 可能的结构是:首先说明漏洞及其影响,然后提到修复情况和建议措施,最后提及相关攻击活动。 例如:“Sansec警告称Magento REST API存在严重漏洞,允许攻击者上传恶意文件并执行代码或接管账户。该漏洞影响多个版本且尚未完全修复。建议限制上传目录访问并扫描恶意软件。同时Netcraft报告数千个Magento站点遭破坏。” 这样大约在100字左右。 检查一下是否涵盖了所有关键点:漏洞名称PolyShell?可能不需要提到名字。重点在于影响和应对措施以及相关事件。 最终总结应该简洁明了,包含主要风险、影响范围、修复状态和建议措施以及相关事件。 </think> Sansec警告称Magento REST API存在严重漏洞,允许攻击者上传恶意文件并执行代码或接管账户。该漏洞影响多个版本且尚未完全修复。建议限制上传目录访问并扫描恶意软件。同时Netcraft报告数千个Magento站点遭破坏。 2026-3-20 09:30:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Web Security / Vulnerability

Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover.

The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in the wild. The unrestricted file upload flaw affects all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2.

The Dutch security firm said the problem stems from the fact that Magento's REST API accepts file uploads as part of the custom options for the cart item.

"When a product option has type 'file,' Magento processes an embedded file_info object containing base64-encoded file data, a MIME type, and a filename," it said. "The file is written to pub/media/custom_options/quote/ on the server."

Depending on the web server configuration, the flaw can enable remote code execution via PHP upload or account takeover via stored XSS.

Sansec also noted that Adobe fixed the issue in the 2.4.9 pre-release branch as part of APSB25-94, but leaves current production versions without an isolated patch.

"While Adobe provides a sample web server configuration that would largely limit the fallout, the majority of stores use a custom configuration from their hosting provider," it added.

To mitigate any potential risk, e-commerce storefronts are advised to perform the following steps -

  • Restrict access to the upload directory ("pub/media/custom_options/").
  • Verify that nginx or Apache rules prevent access to the directory.
  • Scan the stores for web shells, backdoors, and other malware.

"Blocking access does not block uploads, so people will still be able to upload malicious code if you aren't using a specialized WAF [Web Application Firewall]," Sansec said.

The development comes as Netcraft flagged an ongoing campaign involving the compromise and defacement of thousands of Magento e-commerce sites across multiple sectors and geographies. The activity, which commenced on February 27, 2026, involves the threat actor uploading plaintext files to publicly accessible web directories.

"Attackers have deployed defacement txt files across approximately 15,000 hostnames spanning 7,500 domains, including infrastructure associated with prominent global brands, e-commerce platforms, and government services," security researcher Gina Chow said.

It's currently not clear if the attacks are exploiting a specific Magento vulnerability or misconfiguration, and it's the work of a single threat actor. The campaign has impacted infrastructure belonging to several globally recognized brands, including Asus, FedEx, Fiat, Lindt, Toyota, and Yamaha, among others.

The Hacker News has also reached out to Netcraft to understand if this activity has a connection to PolyShell, and we will update the story if we hear back.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/magento-polyshell-flaw-enables.html
如有侵权请联系:admin#unsafe.sh