Security release notes 202509.0
Edit on GitHubThis document describes the security-related issues that have been recently resolved.
For additional support with this content, contact our support. If you found a new security vulnerability, contact us at [email protected].
Potential Authorisation Bypass on Certain Endpoints
It was possible for an attacker to bypass authorisation controls that are in place, by adding multiple ‘/’ characters to the beginning of the path of certain endpoints. Even if this is not considered an important vulnerability, it can potentially be used in combination with other vulnerabilities and under certain circumstances might lead to sensitive information being leaked.
Fix the vulnerability
Add or adjust the $config[CustomerConstants::CUSTOMER_SECURED_PATTERN] line within the config/Shared/config_default.php
file:
$config[CustomerConstants::CUSTOMER_SECURED_PATTERN] = '(^/login_check$|^[/]*([A-Z]{2})?[/]*(en|de)?[/]*customer($|/)|^[/]*([A-Z]{2})?[/]*(en|de)?[/]*wishlist($|/)|^[/]*([A-Z]{2})?[/]*(en|de)?[/]*shopping-list($|/)|^[/]*([A-Z]{2})?[/]*(en|de)?[/]*quote-request($|/)|^(/[A-Z]{2})?(/en|/de)?/comment($|/)|^(/[A-Z]{2})?(/en|/de)?/company(?!/register)($|/)|^[/]*([A-Z]{2})?[/]*(en|de)?[/]*multi-cart($|/)|^(/[A-Z]{2})?(/en|/de)?/shared-cart($|/)|^(/en|/de)?/cart(?!/add)($|/)|^(/en|/de)?/checkout($|/))|^(/en|/de)?/cart-reorder($|/)|^(/en|/de)?/order-amendment($|/)';
Thank you!
For submitting the form