Categories: Breaking NewsHacking

eBay promptly fixed a reflected file download vulnerability

EBay has recently fixed a reflected file download vulnerability discovered by the security researcher David Sopas at WebSegura.

Ebay is among the web services most targeted by cyber criminals and phishers, over the years, security experts have spotted an impressive amount of attack exploiting techniques more or less sophisticated. Almost every attack relies on social engineering, attackers trick victims into clicking on malicious links or to visit websites hosting any kind of exploit kits used to steal victim’s credentials.

Security researcher David Sopas at WebSegura discovered a reflected file download vulnerability and reported it to eBay in March. Sopas is a known expert that in the past discovered similar flaw affecting GitHub, Facebook and Instagram. The company promptly solved the problem and releases a fix a few days ago.

What if malicious users could improve their phishing campaigns on eBay? What if malicious pages linked eBay to download malicious files and infect users?” Sopas wrote in an advisory that is temporary not available.

“When using eBay and inspecting it’s requests I noticed a call to a JSON file that made me wonder a bit about a security vulnerability – Reflected Filename Download.”

The company promptly solved the problem and released a fix a few days ago. The eBay website was affected by a reflected file download vulnerability that could be exploited by an attacker to trick victims into believing that they were downloading a file from the legitimate website. Sopas explained some browsers, including Internet Explorer 8 and 9, allow the attack by simply visiting a malicious URL, meanwhile other browsers make possible the exploitation of the flaw only by forcing the user to download the file.

The exploitation of the flaw in the eBay domain allow attackers to gain control of the victim’s PC, the user in fact, have no perception of the attack because from their perspective a harmless file is downloaded from the legitimate eBay website. 

“Pretty easy to implement but not easy to find. RFD attacks are still very common and many companies are not aware of it’s real danger,” said Sopas, which connfirmend also that the attack is quite easy to carry out. “The victim always thinks that the source file is on the trusted site.”

Pierluigi Paganini

(Security Affairs – eBay, reflected file download vulnerability)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A bug in Chrome Password Manager caused user credentials to disappear

Google addressed a Chrome's Password Manager bug that caused user credentials to disappear temporarily for…

3 hours ago

BIND updates fix four high-severity DoS bugs in the DNS software suite

The Internet Systems Consortium (ISC) released BIND security updates that fixed several remotely exploitable DoS…

14 hours ago

Terrorist Activity is Accelerating in Cyberspace – Risk Precursor to Summer Olympics and Elections

Terrorist groups are increasingly using cyberspace and digital communication channels to plan and execute attacks.…

18 hours ago

Progress Software fixed critical RCE CVE-2024-6327 in the Telerik Report Server

Progress Software addressed a critical remote code execution vulnerability, tracked as CVE-2024-6327, in the Telerik Report…

1 day ago

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

A critical flaw in some versions of Docker Engine can be exploited to bypass authorization…

1 day ago

Hackers exploit Microsoft Defender SmartScreen bug CVE-2024-21412 to deliver ACR, Lumma, and Meduza Stealers

The CVE-2024-21412 flaw in the Microsoft Defender SmartScreen has been exploited to deliver information stealers…

2 days ago

This website uses cookies.