Adobe forced to patch its own failed security update
Company issues new fix for e-commerce vulnerability after researchers bypass the original update
Adobe has had to issue another software update after an out-of-band patch failed to fix a vulnerability in its e-commerce software.
The CVE-2022-24086 input validation bug allowed attackers to run their own code on e-commerce sites, making them vulnerable to cart skimmers. The company said that the attack had been exploited in the wild.
Adobe credited the new discovery to one of the bug researchers that found the original vulnerability. The researcher from security company Bugscale, who uses the Twitter handle @Blaklis, warned about Adobe's first patch on Twitter. "THIS IS NOT SUFFICIENT to be safe," they said, adding a comment that hinted at the cause of the problem: "take care of json/url encoded values".
Researchers at security company Positive Technologies also warned that they had bypassed the initial patch to exploit the vulnerability again. "We weren't the first," they added.
The additional research created a new vulnerability ID, CVE-2022-24087. It mirrors the first bug's 9.8 (critical) rating. Adobe released a fix for the bug, which customers must apply on top of the first patch.
This isn't the first critical vulnerability that Adobe has had to patch lately. Earlier this month it issued a patch for a critical bug, CVE-2022-23202, that enabled attackers to execute their own code in its Creative Cloud Desktop application.
The 3D skills report
Add 3D skills to your creative toolkits and play a sizeable role in the digital futureFree Download
The increasing need for environmental intelligence solutions
How sustainability has become a major business priority and is continuing to grow in importanceFree Download
2022 State of the multi-cloud report
What are the biggest multi-cloud motivations for decision-makers, and what are the leading challengesFree Download
Solve global challenges with machine learning
Tackling our word's hardest problems with MLFree Download