Magento Security Patches
Security Updates and News
- Magento 2.2.6 and 2.1.15
- Magento Security Patch 2.2.1, 2.1.10 and 2.0.17 Update
- Magento 2.0.16 and 2.1.9 Security Update
- SUPEE-6788 Technical Details
- SUPEE-6788 Address Zend Framework Vulnerability Update
- Magento Security Patch 2.0.1 Update
- Magento 2.0.4 Security Update
- Magento 2.0.6 Security Update
- Magento Security Update 2.0.10 and 2.1.2
- Magento 2.0.14 and 2.1.7 Security Update
Magento Security Patch SUPEE-10415
The Magento SUPEE-10415 Security Patch was released on November 28, 2017, and it addresses various issues in the Magento 1.x Platform. We highly recommend vendors download this update as soon as possible to receive the protection, as well as the benefits, of the fixes. Read on to learn about the details and repairs, and how to get help installing it.
Why Install Magento’s SUPEE-10415 Security Patch?
Security improvements in SUPEE-10415, Open Source 22.214.171.124, and Magento Commerce 126.96.36.199 will address numerous vulnerabilities such as the following:
- Remote code execution (RCE)
- Cross-site request forgery (CSRF)
- Cross-site scripting
You can expect the following fixes and benefits with the Magento Security Patch SUPEE-10415:
- Magento Commerce 188.8.131.52: Previously, when a user loaded the Admin, an “invalid security key; please refresh page” message would appear. This issue has been resolved. Also, a typo was corrected in the patch header information. And finally, a “no payment required” message is displayed when one of your customers checks out and no amount is due. These fixes will benefit your site, as the improved functions minimize errors and encourage users with reliable information about what is needed to complete a transaction.
- Magento Open Source 184.108.40.206: Before this security patch, when a user loaded the Admin, an “invalid secret key; please refresh the page” message would show. This issue has been resolved. Additionally, a typo was fixed in the patch header information: what was previously “pawwsord” has been corrected to “password.” Also, your customers will be further encouraged to complete a transaction that requires no funds due. A “no payment information required” message will now appear.
What follows is a list of a few high-severity-risk issues the Magento Security Patch SUPEE-10415 will fix.
APPSEC-1894: RCE (Unsafe Unserialization)
Rated as a high 8.2 risk as per CVSSv3 severity, this is an RCE fix. There have been no known attacks, but an administrator with limited privileges could add injectable code in promo fields. This would create vulnerability to an arbitrary remote code execution.
APPSEC-1913: RCE (Config Manipulation)
Rated as a high 7.2 risk as per CVSSv3 severity, this is another RCE fix. There have been no known attacks, but an administrator with limited privileges could add a malformed configuration bypass, which would create a file redirection that could be used in an arbitrary remote code execution.
APPSEC-1915: RCE (CMS Page Area)
Rated as a high 8.2 risk as per CVSSv3 severity, this is another RCE fix.
There have been no known attacks, but an administrator with limited privileges could create a CMS page that could be parsed incorrectly, which could lead to an arbitrary remote code execution.
APPSEC-1830: PHP Object Injection in Product Attributes
Rated as a high 8.2 risk as per CVSSv3 severity, this remote code execution fix has had no previous attacks. An administrator with limited privileges could add a widget block that included a malicious code, which could have led to an arbitrary remote code execution.
Apply the Magento SUPEE-10415 Patch Installed Today
For protection against the above threats and others not listed, install the Magento Security Patch SUPEE-10415. Your site will be improved and safer, and Forix ensures that your installation will be implemented correctly. Upgrade now to get the latest fixes, features, and security updates.