Option 1 - For merchants who have not applied the security update from June 11, 2024, nor the isolated patch released on June 28, 2024

  1. Apply hotfix released on July 17, 2024.
  2. Apply the security patch.
  3. Enable maintenance mode.
  4. Disable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:disable).
  5. Rotate your encryption keys.
  6. Flush the cache.
  7. Enable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:enable).
  8. Disable maintenance mode.

OR

  1. Apply the isolated patch. NOTE: This version of the isolated patch contains the July 17, 2024, hotfix within it.
  2. Enable maintenance mode.
  3. Disable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:disable).
  4. Rotate your encryption keys.
  5. Flush the cache.
  6. Enable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:enable).
  7. Disable maintenance mode.

Option 2 - For merchants who have already applied the security update from June 11, 2024, and/or the isolated patch released on June 28, 2024

  1. Apply hotfix released on July 17, 2024.
  2. Enable maintenance mode.
  3. Disable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:disable).
  4. Rotate your encryption keys.
  5. Flush the cache.
  6. Enable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:enable).
  7. Disable maintenance mode.

Option 3 - For merchants who have already (1) applied the security update from June 11, 2024, and/or (2) the isolated patch released on June 28, 2024, and (3) rotated your encryption keys

  • Apply the hotfix released on July 17, 2024.
NOTE
To ensure you are still safe after upgrading, you must also rotate your encryption keys:

1. Enable maintenance mode.
2. Disable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:disable).
3. Rotate your encryption keys.
4. Enable cron execution (Commerce on Cloud command: vendor/bin/ece-tools cron:enable).
5. Disable maintenance mode.

In this article you will find how to implement the isolated patch for this issue for the current and earlier versions of Adobe Commerce and Magento Open Source.
NOTE: This version of the isolated patch contains the July 17, 2024, hotfix within it.

Affected products and versions

Adobe Commerce on Cloud, Adobe Commerce on-premise, and Magento Open Source:

  • 2.4.7-p1 and earlier
  • 2.4.6-p6 and earlier
  • 2.4.5-p8 and earlier
  • 2.4.4-p9 and earlier

Solution for Adobe Commerce on Cloud, Adobe Commerce on-premise Software, and Magento Open Source

To help resolve the vulnerability for the affected products and versions, you must apply the VULN-27015 patch (dependent on your version) and rotate your encryption keys.

Hotfix Details

Isolated Patch Details

NOTE: This version of the isolated patch contains the July 17, 2024, hotfix within it.

Use the following attached patches, depending on your Adobe Commerce/Magento Open Source version:

For version 2.4.7:

For versions 2.4.6, 2.4.6-p1, 2.4.6-p2, 2.4.6-p3, 2.4.6-p4, 2.4.6-p5:

For versions 2.4.5, 2.4.5-p1, 2.4.5-p2, 2.4.5-p3, 2.4.5-p4, 2.4.5-p5, 2.4.5-p6, 2.4.5-p7:

For versions 2.4.4, 2.4.4-p1, 2.4.4-p2, 2.4.4-p3, 2.4.4-p4, 2.4.4-p5, 2.4.4-p6, 2.4.4-p7, 2.4.4-p8:

How to apply the isolated patch and the hotfix

Unzip the file and see How to apply a composer patch provided by Adobe in our support knowledge base for instructions.

For Adobe Commerce on Cloud merchants only - How to tell whether the isolated patches have been applied

Considering that it isn’t possible to easily check if the issue was patched, you might want to check whether the VULN-27015 isolated patch has been successfully applied.

You can do this by taking the following steps, using the file VULN-27015-2.4.7_COMPOSER.patch as an example:

  1. Install the Quality Patches Tool.

  2. Run the command:

    cve-2024-34102-tell-if-patch-applied-code

  3. You should see output similar to this, where VULN-27015 returns the  Applied  status:

    ║ Id            │ Title                                                        │ Category        │ Origin                 │ Status      │ Details                                          ║ ║ N/A           │ ../m2-hotfixes/VULN-27015-2.4.7_COMPOSER_patch.patch      │ Other           │ Local                  │ Applied     │ Patch type: Custom
    

Rotate/change the encryption key after applying the patch

For guidance on how to rotate/change the encryption key after applying the patch, please refer to Admin systems guide: Encryption key in the Commerce Admin Systems Guide documentation.

Additional guidance on securing your store and rotating encryption keys

For additional guidance on securing your store and rotating encryption keys regarding CVE-2024-34102, see Guidance on securing your store and rotating encryption keys: CVE-2024-34102, also in the Adobe Commerce Knowledge Base.

Security updates

Security updates available for Adobe Commerce:

Enable or disable maintenance mode in the Adobe Commerce Installation Guide

Previous pageTroubleshooting Encryption Key Rotation: CVE-2024-34102
Next pageUPS shipping method integration migration from SOAP to RESTful API

Commerce


Connect with Experience League at Summit!

Get front-row access to top sessions, hands-on activities, and networking—wherever you are!

Learn more