Adobe has released security updates for Adobe Commerce and Magento Open Source. These updates resolve a vulnerability rated critical. Successful exploitation could lead to arbitrary code execution.
Adobe is aware that CVE-2022-24086 has been exploited in the wild in very limited attacks targeting Adobe Commerce merchants.
This vulnerability has a similar severity as the Magento Shoplift vulnerability from 2015. At that time, nearly all unpatched Magento stores globally were compromised in the days after the exploit publication.
– Sansec (https://sansec.io/research/magento-2-cve-2022-24086)
If you have time to do a new deployment, use this guide for reference: https://www.integer-net.com/applying-the-magento-security-patch-via-composer/
Since time is of the absolute essence, run this quick method if you can't do the above today.
Whatever you do, do it TODAY!
- Download and extract the composer patch from https://github.com/magento/knowledge-base/blob/main/src/troubleshooting/known-issues-patches-attached/assets/MDVA-43395_EE_2.4.3-p1_COMPOSER_v1.patch.zip?raw=true
- SSH into your server and
cd
into the Magento root directory - Create and edit a new file
MDVA-43395.patch
, insert the contents of theMDVA-43395_EE_2.4.3-p1_COMPOSER_v1.patch
file from the archive above - Run
patch -p1 < MDVA-43395.patch
, or if that fails, runpatch -p2 < MDVA-43395.patch
- Just in case, if you have OPCache running, try to flush it if you have the rights. Restarting your PHP service also takes care of this.
- Run
bin/magento cache:flush
- Take a breath, then plan to implement a proper fix. Probably Adobe comes with a patch-release update for all Magento versions soon.
An additional patch was released in followup of the above.
Full information can be found on the Adobe Security Bulletin page: https://helpx.adobe.com/security/products/magento/apsb22-12.html
Instructions are basically the same as above, but the addtional patches are more extensive than the first one, so inevitably the patches are different per Magento versions.
If you are on 2.4.3, the new composer patch is here: https://github.com/magento/knowledge-base/blob/main/src/troubleshooting/known-issues-patches-attached/assets/MDVA-43443_EE_2.4.3-p1_v1.patch.zip?raw=true
If you are on 2.3.4-p2 till 2.4.2-p2, the new composer patch is here: https://github.com/magento/knowledge-base/blob/main/src/troubleshooting/known-issues-patches-attached/assets/MDVA-43443_EE_2.4.2-p2_COMPOSER_v1.patch.zip?raw=true
If you are on 2.3.3-p1 till 2.3.4, the new composer patch is here: https://github.com/magento/knowledge-base/blob/main/src/troubleshooting/known-issues-patches-attached/assets/MDVA-43443_EE_2.3.4_COMPOSER_v1.patch.zip?raw=true
After downloading the patch, put the file in the root of your webdirectory and run the commandline patch command again, as described above.
If you have manually added CSS to transactional emails through the Magento Admin, these styles break after applying the patch above. (Credits to integer_net for reporting this issue)
There is currently no fix available yet, but you should 100% rather apply the patch and have broken email styles than not patching!
You can check wheter you have custom styles enabled for your emails by checking if you have any content in the Template Styles
field in the email templates in the Magento Admin, or run the following SQL command:
SELECT COUNT(*) FROM `email_template` WHERE template_styles like '%{%';
Thanks all sites are patched using this guide.