Skip to content

Instantly share code, notes, and snippets.

@edmondscommerce
Created April 27, 2016 11:01
Show Gist options
  • Save edmondscommerce/2666b3aa80453d7e6651a25490354f49 to your computer and use it in GitHub Desktop.
Save edmondscommerce/2666b3aa80453d7e6651a25490354f49 to your computer and use it in GitHub Desktop.
Recursively check directory for Magento Modules listed as having a possible SQL injection vulnerability
#!/bin/bash
find . -type d -ipath '*app/etc/modules' | \
while read f;
do
echo $f;
ls -l "${f}" | \
grep 'EM_Quickshop.xml\|EM_Ajaxcart.xml\|Smartwave_QuickView.xml\|MD_Quick';
done | grep -B 1 'xml'
@edmondscommerce
Copy link
Author

Magento has sent out an email saying that some third party extensions are at risk of an SQL Injection Attack.

This script will check if they are installed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment