We’re always looking out for ways to better your web experiences with us on the service and security front. We’d like to draw your attention to new security vulnerabilities identified in two popular scripts – WordPress & Magneto. Please note that these issues are script-based and are not specific to SolutionPoint platform in any way. Read on to know more about these vulnerabilities, assess whether you could be impacted and take preventive action.
Impact: If triggered by a logged-in administrator, under default settings the attacker can leverage the vulnerability to execute arbitrary code on the server via the plugin and theme editors.
Alternatively the attacker could change the administrator’s password, create new administrator accounts, or do whatever else the currently logged-in administrator can do on the target system. You can find more details about the impact and solution for the same at http://klikki.fi/adv/wordpress2.html
Steps you need to take:
We would request you to go through the recommendations and update your WordPress website using the patch available at http://klikki.fi/adv/wordpress2.html
Magento Vulnerability: This is a vulnerability that has been recently reported too. The vulnerability is actually comprised of a chain of several vulnerabilities that ultimately allow an unauthenticated attacker to execute PHP code on the web server.
Impact: The attacker can bypass all security mechanisms and gains control of the store and its complete database, allowing credit card theft or any other administrative access into the system. This attack is not limited to any particular plugin or theme. All the vulnerabilities are present in the Magento core, and affects any default installation of both Community and Enterprise
Steps you need to take: If you are using the mentioned vulnerable versions of Magento, we would request you to patch it using the updates provided at http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/
You can test whether your Magento website is vulnerability or not, using this tool https://shoplift.byte.nl
We strongly recommend you access all your packages and patch them immediately to avoid any issues. In case you require any information regarding this email, please feel free to get in touch with us via http://support.solutionpoint.in/