Site icon Astra Security Blog

Magento Websites at Risk Due to Critical Vulnerabilities in PHP Versions 7.1, 7.2 & 7.3

Magento Websites at Risk Due to Critical Vulnerabilities in PHP Versions 7.1, 7.2 & 7.3

The leading web application language PHP is found to have several critical vulnerabilities in versions 7.1, 7.2 & 7.3. The most dreading of it all is the arbitrary code execution vulnerability in PHP. Many popular CMS like, WordPress, Magento, Drupal, Joomla, etc. use PHP as their tech stack.

Although there have not been any wild attacks yet. Still, the severity of the vulnerability could be guessed by the vast number of websites it puts to risk.

PHP released an update on 29th Aug about the bug fixes and release of new versions. However, web owners are yet to update their website’s PHP versions.

The updated versions are:

Download the updated versions from here.

Technical Details

The vulnerabilities found and patched by PHP could allow arbitrary code execution in websites, if not updated. Apart from code execution, it could also allow attackers to install malicious programs; see, modify, and delete data; create fake user accounts. Also, a failed exploitation could render DoS (denial-of-service) for your website.

PHP’s official website

Most CMS developers are taking it upon themselves to spread the word to their customers. For instance, Magento sent a mail to its customers citing the critical vulnerability. It also put a deadline of 30th September for its customers to update their PHP versions.

Magento’s warning mail

Bug Fixes in Version 7.1.32

Bug Fixes in Version 7.2.22

Bug Fixes in Version 7.3.9

Conclusion

We cannot stress this enough, update as soon as possible. Downloading these security patches will mitigate the risks to a bare minimum. And, install a web application firewall to check any attempted attack. The Astra firewall provides continuous protection to your website against RCE, SQLi, XSS, CSRF, OWASP Top 10 and 100+ other cyber attacks.

Exit mobile version