Hackers are exploiting a serious vulnerability in the pkfacebook module for PrestaShop, an open-source e-commerce platform, to deploy a card skimmer on affected online stores. The flaw, tracked as CVE-2024-36680, is an SQL injection vulnerability found in the `facebookConnect.php` Ajax script of the pkfacebook module. This weakness allows attackers to inject malicious SQL commands via HTTP requests, potentially leading to the theft of payment credit card details from unsuspecting customers.
The module, which integrates Facebook login and communication features into PrestaShop stores, is sold through the vendor’s website and is used by many online retailers. Despite claims by Promokit.eu that the flaw was fixed “a long time ago,” a proof-of-concept exploit was recently published, demonstrating that the vulnerability is still actively being exploited in the wild. The developers have not provided updated releases to confirm if the issue has been resolved.
TouchWeb analysts discovered the vulnerability in March 2024, and Friends-of-Presta has reported active exploitation of this flaw to deploy web skimmers. To mitigate the risk, users are advised to upgrade to the latest version of pkfacebook, ensure that security practices like using `pSQL` are in place, and activate Web Application Firewall (WAF) rules such as OWASP 942.
The issue highlights the ongoing risks associated with SQL injection vulnerabilities in e-commerce platforms. Hackers can leverage such flaws to gain administrative access, manipulate data, and compromise email systems. Store owners are urged to stay vigilant, apply security patches, and implement recommended security measures to protect against these attacks.
Reference: