Coming up: 12 Aug - Magento Stammtisch Kiel training

Yireo - Trainings & extensions

Open main menu

Magento security issues - SUPEE-8788

Magento announced a few days ago on October 11th the release of a new patch SUPEE-8788 which closes a dangerous security hole in Magento. After that, Magento 1.9.3 has been released and Magento 2.1.2 as well. If you have a Magento site, patch now! This is said to have the same impact as the ShopLift attack a few years ago.

Overview of the security risks

The patch is a bundle of fixes, not only fixes for the risky holes but also some lesser stuff. The main vulnerabilities seem to have been reported by Peter O'Callaghan, an independent Magento developer and security expert. Of the vulnerabilities, the Remote Code Execution in the checkout (APPSEC-1484) is the most serious - it allows hackers to insert PHP code in the payment gateways and thus get access to your entire Magento site.

A SQL Injection bug in Zend Framework (APPSEC-1480) is also found in essential ordering parameters of grids. This is still a bit theoretical because only vulnerable point was discovered in the Magento backend. However, when combined with XSS and CSRF attacks (and those are included in the patch as well) it could allow attackers to gain access to your backend as well.

There is much more to the patch, but I'll leave you at it to study the details yourself:

However, the most import thing is now to patch. Now.

Magento 1.9.3

The patch SUPEE-8788 includes various fixes and can be installed on any Magento 1.X site using the patch shell script that Magento provides. However, I would recommend you to consider upgrading the Magento core instead: If you are unable to upgrade from (let's say) Magento 1.7 to 1.9.3, this is a problem on its own and it should be dealt with. Being stuck on an old Magento version, also means being stuck on an old PHP and MySQL, and it simply means your shop is stuck, your business is stuck.

Upgrading should be a healthy business, but it should not be taken lightly: It is not a copy-file-done action. If you need help with the upgrade process, do let us know. Upcoming week we are extremely busy with a Magento 2 Seminar. However after that, or in between, we can perhaps squeeze in an upgrade or test upgrades, to help you out.

Magento 2.1.2

For Magento 2, similar vulnerabilities exist and are therefore fixed, though the vulnerabilities seem to be a bit less dangerours. You should upgrade nonetheless: Instead of patching file or copying the new core files, the only recommended way to upgrade Magento 2 is via composer. It runs fine in our case. And again, if you need any help, let us know.

Posted on 14 October 2016

Looking for a training in-house?

Let's get to it!

Do not miss out on what we say

This will be the most interesting spam you've ever read

We don't write too commercial stuff, we focus on the technology (which we love) and we regularly come up with innovative solutions. Via our newsletter, you can keep yourself up to date on all of this coolness. Subscribing only takes seconds.

Sign up for the Yireo newsletter


Legal information

Other Yireo sites

Get Social

About Yireo