• Home
  • Magento Themes
  • Magento Extensions
  • Demo
  • Membership
    • Login Club
    • Pricing
  • Support
    • Submit a Ticket
    • Contact Form
  • FAQs
    • Knowledge Base

Plaza Plaza

Plaza

  • Home
  • Magento Themes
  • Magento Extensions
  • Demo
  • Membership
    • Login Club
    • Pricing
  • Support
    • Submit a Ticket
    • Contact Form
  • FAQs
    • Knowledge Base
  • Login

Welcome to Plazathemes

The Effortless Helpdesk Support Theme for Magento

Request Support
    Trending searches: magento, theme
    Our awesome support is currently AVAILABLE
    Official hour: Mon-Fri / 8am-5pm (GMT+7)
    Your time: 00:00:00 Our time: 00:00:00
    Home Knowledge Base Magento SUPEE-6788 Technical Details in Magento

    SUPEE-6788 Technical Details in Magento

    18/11/2015 Posted in: Magento Hits: 3827   SUPEE-6788 (1)    Technical Details (1)    Magento (3)

    1

    Magento Enterprise Edition 1.14.2.2, Community Edition 1.9.2.2 and the patch bundle SUPEE-6788 address several security issues. Unfortunately, addressing these issues required some changes that may possibly break backward compatibility with customizations or extensions. Below you will find a list of changes and potential issues that may arise:

    APPSEC-1034, addressing bypassing custom admin URL

    • Note: This part of the patch is disabled by default. To protect non-default admin URLs against automated attacks, the patch must be enabled by changing the routing compatibility mode in configuration. Use “Enable Admin routing compatibility mode” under System > Configuration > Admin > Security.
    • If a module has admin functionality that is not under the admin URL, it will need to be modified (eg. http://domain.com/cool_module instead of http://domain.com/admin/cool_module)
    • Developers need to change etc/config.xml and all code lines where they generate links to the admin part of the module.
    • For example the following config.xml file for a module:

    1

    Should be changed to:

    1

    APPSEC-1063, addressing possible SQL injection

    • Modules that use SQL statements as field names or escape fields manually will need to be modified. Examples of code that is no longer allowed:

    1

     

    • Developers will need to change the way they generate filters for collections.
    • The following code:

    1

    Should be changed to:

    1

    The following code:

    1

    Should be changed to:

    1

    The following approach could be used alternatively:

    1

    APPSEC-1057, template processing method allows access to private information:

    • Magento now includes a white list of allowed blocks or directives. If a module or extension uses variables like {{config path=”web/unsecure/base_url”}} and {{block type=rss/order_new}} in CMS pages or emails, and the directives are not on this list, you will need to add them with your database installation script. Extensions or custom code that handles content (like blog extensions) might be affected.
    • A full list of allowed variables and blocks in the default installation is:

    Variables:

    1

    Blocks:

    1

     

    • Note: you can configure allowed variables and blocks in System > Permissions > Blocks and System > Permissions > Variables.
    • If your code uses some config variables or blocks, you need to create a data update script that adds variables or blocks to the white list tables:

    1

    APPSEC-1079, addressing potential Exploit with Custom Option File Type

    • This change will affect any customization that uses product custom options to save information as a PHP object. Such approach will no longer be possible.

    APPSEC-1039/APPSEC-1228, Cross site scripting with error messages/CSRF/Session fixation

    • This change affects templates by adding form_key to customer registration page customer/form/register.phtml and persistent/customer/form/register.phtml. If your store includes customized registration page template, make sure to add this key there as well. Please refer to the patch source code for exact changes.

    1

    APPSEC-1027, Insufficient Protection of Password Reset Process

    • This change affects templates by changing form submission and adding token validation in password forgotten page. Files affected are layout/customer.xml and template/customer/form/resetforgottenpassword.phtml. If your store includes customized password forgotten template or layout, make sure to implement those changes there as well. Please refer to the patch source code for exact changes.

    – Source : http://magento.com/security/patches/supee-6788-technical-details#sthash.gt1u2t9g.dpuf

     

     

    0 people found this useful.   Me too
    Not Helpful

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Support Policy

    We really care about customer support services and guarantee to response to all support topics within 24 hours on weekday (a bit longer over weekend). Due to different timezone, you may get very fast response when we are available; our timezone is: GMT+7.

    Plazathemes Club

    • Magento Themes
    • Magento Extensions
    • Membership Login
    • Membership Pricing
    • Demo Magento Themes

    Quick Navigation

    • Terms and Conditions
    • License
    • Customer Services
    • Site Map

    Support

    • Tickets
    • documentation
    • Contact Us

    Payment Method

    We are using secure Paypal payment method. You can pay directly form your Credit Card via Paypal and NEVER store your card information on our site.

    30 DAYS - Money back guarantee !

    Copyright © 2015 Magento Themes by PlazaThemes. All Rights Reserved.

    Login