eBay 'refuses to fix app security flaw'

Remote code execution bug leaves eBay customers at risk, says researcher

eBay sign

Auction site eBay is embroiled in yet another hacking scandal, after researchers found another serious vulnerability that could lead to malware being downloaded onto users' computers.

The flaw bypasses eBay's code validation and can be used to remotely execute malicious Javascript code on targeted eBay users' devices, revealed security firm Check Point, which discovered the flaw late last year.

The mobile-focused attack allows a cyber criminal to "target eBay users by setting up an eBay store with listings for products", Check Point said.

It added: "The listings page contains the malicious code. Customers can be tricked into opening the page using a pop-up message on the attacker's eBay store enticing the user into downloading a new eBay mobile application, by offering a one-time discount."

If the victim taps on the pop-up to accept, it will download a malicious app to their phone, which can then steal data from the user's browser or eBay app, opening them up to phishing attacks or malware infections.

Oded Vanunu, security research group manager at Check Point, said: "The eBay attack flow provides cybercriminals with a very easy way to target users: sending a link to a very attractive product to execute the attack.

"The main threat is spreading malware and stealing private information. Another threat is that an attacker could have an alternate login option pop up via Gmail or Facebook and hijack the user's account."

Perhaps more worryingly, however, is that eBay intends to do nothing about the issue, according to Check Point.

The organisation said that it contacted eBay on 15 December to disclose the vulnerability but that on 16 January the auction site said it had no plans to fix it. EBay did not address this claim when IT Pro asked for a response.

The news comes just weeks after a cross-site scripting (XSS) vulnerability was disclosed on the main eBay site by researcher MLT.

This attack, while different, also exploited Javascript that could allegedly lead to phishing attacks and theft of login credentials.

MLT also told IT Pro they contacted eBay about the vulnerability in December and while eBay did eventually fix it in January, MLT said eBay was generally slow to respond.

IT Pro has also been told eBay has something of "a bad track record" dealing with security researchers, including allegedly refusing to take vulnerability and security reports from hobbyists.

The firm declined to comment on the allegations levelled by Check Point specifically, but a spokesperson told IT Pro: "As a company, we're committed to providing a safe and secure marketplace for our millions of customers around the world. We take reported security issues very seriously, and work quickly to evaluate them within the context of our entire security infrastructure."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021