ÃÛ¶¹ÊÓƵ

Security update available for ÃÛ¶¹ÊÓƵ Commerce - APSB24-61

On August 13, 2024, ÃÛ¶¹ÊÓƵ released a regularly scheduled security update for ÃÛ¶¹ÊÓƵ Commerce, Magento Open Source, and ÃÛ¶¹ÊÓƵ Commerce Webhooks Plugin.
This update resolves vulnerabilities. Successful exploitation could lead to arbitrary code execution, arbitrary file system read, security feature bypass, and privilege escalation. The bulletin is .

NOTE
CVE-2024-39397, listed in the security bulletin above, is applicable only when using the Apache web server. To help ensure that the remediation for this vulnerability can be applied as promptly as possible, ÃÛ¶¹ÊÓƵ has also released an Isolated patch that resolves CVE-2024-39397.

Please apply the latest security updates as soon as possible. If you fail to do so, you will be vulnerable to these security issues, and ÃÛ¶¹ÊÓƵ will have limited means to help remediate.

NOTE
Please contact Support Services if you encounter any issues applying the security patch/Isolated patch.

Affected products and versions

ÃÛ¶¹ÊÓƵ Commerce on Cloud, ÃÛ¶¹ÊÓƵ Commerce on-premises, and Magento Open Source:

  • 2.4.7-p1 and earlier
  • 2.4.6-p6 and earlier
  • 2.4.5-p8 and earlier
  • 2.4.4-p9 and earlier

Solution for ÃÛ¶¹ÊÓƵ Commerce on Cloud, ÃÛ¶¹ÊÓƵ Commerce on-premises Software, and Magento Open Source

To help resolve the vulnerability for the affected products and versions, you must apply the CVE-2024-39397 Isolated patch.

Isolated Patch Details

Use the following attached Isolated patch:

How to apply the Isolated patch

Unzip the file and see How to apply a composer patch provided by ÃÛ¶¹ÊÓƵ in our support knowledge base for instructions.

For ÃÛ¶¹ÊÓƵ Commerce on Cloud merchants only - How to tell whether the Isolated patches have been applied

Considering that it isn’t possible to easily check if the issue was patched, you might want to check whether the CVE-2024-39397 Isolated patch has been successfully applied.

You can do this by taking the following steps, using the file VULN-27015-2.4.7_COMPOSER.patch as an example:

  1. Install the Quality Patches Tool.

  2. Run the command:

    cve-2024-34102-tell-if-patch-applied-code

  3. You should see output similar to this, where VULN-27015 returns the  Applied  s³Ù²¹³Ù³Ü²õ:

    code language-bash
    ║ Id            │ Title                                                        │ Category        │ Origin                 │ Status      │ Details                                          ║ ║ N/A           │ ../m2-hotfixes/VULN-27015-2.4.7_COMPOSER_patch.patch      │ Other           │ Local                  │ Applied     │ Patch type: Custom
    

Security updates

Security updates available for ÃÛ¶¹ÊÓƵ Commerce:

recommendation-more-help
8bd06ef0-b3d5-4137-b74e-d7b00485808a