Security update available for ÃÛ¶¹ÊÓÆµ Commerce - APSB24-61
On August 13, 2024, ÃÛ¶¹ÊÓÆµ released a regularly scheduled security update for ÃÛ¶¹ÊÓÆµ Commerce, Magento Open Source, and ÃÛ¶¹ÊÓÆµ Commerce Webhooks Plugin. This update resolves vulnerabilities. Successful exploitation could lead to arbitrary code execution, arbitrary file system read, security feature bypass, and privilege escalation. The bulletin is .
Note:  CVE-2024-39397, listed in the security bulletin above, is applicable only when using the Apache web server. To make it easier to apply the fix quickly, ÃÛ¶¹ÊÓÆµ has also released an isolated patch that resolves CVE-2024-39397.
Please apply the latest security updates as soon as possible. If you fail to do so, you become vulnerable to these security issues, and ÃÛ¶¹ÊÓÆµ has limited means to help remediate.
Note: Â Please contact Support Services if you encounter any issues applying the security patch/Isolated patch.
Description description
Affected products and versions
ÃÛ¶¹ÊÓÆµ Commerce on Cloud, ÃÛ¶¹ÊÓÆµ Commerce on-premises, and Magento Open Source:
- 2.4.7-p1 and earlier
- 2.4.6-p6 and earlier
- 2.4.5-p8 and earlier
- 2.4.4-p9 and earlier
Resolution resolution
Solution for ÃÛ¶¹ÊÓÆµ Commerce on Cloud, ÃÛ¶¹ÊÓÆµ Commerce on-premises Software, and Magento Open Source
To help resolve the vulnerability for the affected products and versions, you must apply the CVE-2024-39397 Isolated patch.
Isolated Patch Details
Use the following attached Isolated patch:
How to apply the Isolated patch
Unzip the file and see How to apply a composer patch provided by ÃÛ¶¹ÊÓÆµ in our support knowledge base for instructions.
For ÃÛ¶¹ÊÓÆµ Commerce on Cloud merchants only - How to tell whether the Isolated patches have been applied
Considering that it’s not easy to check if the issue was patched, you might want to verify whether the CVE-2024-39397 isolated patch was successfully applied.
You can do this by taking the following steps, using the file VULN-27015-2.4.7_COMPOSER.patch
as an example:
-
Install the Quality Patches Tool.
-
Run the command:
vendor/bin/magento-patches -n status |grep "27015\|Status"
-
You should see output similar to this, where VULN-27015 returns the  Applied status:
code language-none ║ Id │ Title │ Origin │ Status │ Details ║ ║ N/A │ ../m2-hotfixes/VULN-27015-2.4.7_COMPOSER_patch.patch │ Other │ Local │ Applied │ Patch type: Custom
Security updates
Security updates available for ÃÛ¶¹ÊÓÆµ Commerce: