On September 3, Multi-State Information Sharing and Analysis Center (MS-ISAC) has issued an alert related to multiple vulnerabilities that could allow for arbitrary code execution and a recommendation that all sites using PHP should update to the latest PHP version ASAP (full alert is available here).
On Adobe Commerce on cloud infrastructure please note that service upgrades cannot be pushed to the production environment without 48 business hours’ notice to our infrastructure team. This is required as we need to ensure that we have an infrastructure support engineer available to update your configuration within a desired timeframe with minimal downtime to your production environment. So 48 hours prior to when your changes need to be on production submit a support ticket detailing your required service upgrade and stating the time when you want the upgrade process to start.
Read on for impacts and steps for Adobe Commerce sites:
Adobe Commerce hosted on our Cloud product
If you are using Adobe Commerce on cloud infrastructure, please work with your technology team to redeploy Adobe Commerce starting at any time* in order to take advantage of the update. We recommend that Merchants complete this redeployment by September 30 in order to avoid PCI compliance issues that may go into effect as a result of these vulnerabilities at the end of the month.
Additional notes on redeploying your Cloud site for this update:
* Previous versions of this article and our messaging stated September 19, but our teams have finished their work ahead of schedule.
Adobe Commerce on all other hosting solutions
Since Adobe Commerce relies on PHP, we recommend that all Merchants using Adobe Commerce review necessary updates for PHP with their hosting provider. We also recommend that Merchants complete this review and any updates by September 30 in order to avoid PCI compliance issues that may go into effect as a result of these vulnerabilities at the end of the month.
Please note some additional details for Adobe Commerce on other hosting solutions:
Per the alert, recommended patches for this vulnerability include:
If you would like more information on PHP and recent releases, you can visit PHP’s site. And if you have questions or would like more information on best practices for security, please check out our Security Best Practices Guide.