Skip to content

security

Auto Added by WPeMatico

How I could install HtmlPurifier in my custom module?

I made my own form: <?xml version=”1.0″?> <form xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance” xsi:noNamespaceSchemaLocation=”urn:magento:module:Magento_Ui:etc/ui_configuration.xsd”> <argument name=”data” xsi:type=”array”> <item name=”js_config” xsi:type=”array”> <item name=”provider” xsi:type=”string”>customer_form.customer_form_data_source</item> </item> <item name=”label” xsi:type=”string” translate=”true”>Blogpost Actions</item> <item name=”reverseMetadataMerge” xsi:type=”boolean”>true</item> </argument> <settings> <buttons> <button name=”save” class=”MageGuideFirstModuleBlockAdminhtmlEditSaveButton”/> <button name=”back” class=”MageGuideFirstModuleBlockAdminhtmlEditBackButton”/> </buttons> <layout> <navContainerName>content</navContainerName>… Read More »How I could install HtmlPurifier in my custom module?

Does magento2.4 sanitizes form input in order to avoid XSS or I have to implement my own methods?

I made my first form: <?xml version=”1.0″?> <form xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance” xsi:noNamespaceSchemaLocation=”urn:magento:module:Magento_Ui:etc/ui_configuration.xsd”> <argument name=”data” xsi:type=”array”> <item name=”js_config” xsi:type=”array”> <item name=”provider” xsi:type=”string”>customer_form.customer_form_data_source</item> </item> <item name=”label” xsi:type=”string” translate=”true”>Blogpost Actions</item> <item name=”reverseMetadataMerge” xsi:type=”boolean”>true</item> </argument> <settings> <buttons> <button name=”save” class=”MageGuideFirstModuleBlockAdminhtmlEditSaveButton”/> <button name=”back” class=”MageGuideFirstModuleBlockAdminhtmlEditBackButton”/> </buttons> <layout> <navContainerName>content</navContainerName>… Read More »Does magento2.4 sanitizes form input in order to avoid XSS or I have to implement my own methods?

Magento 2 Payment Method Hacked

My website’s checkout was hacked this 4th time. The hacker somehow modifies the following files: lib/web/jquery.js vendor/magento/framework/Interception/Interceptor.php vendor/magento/framework/Message/Session.php and adds some kind of encrypted scripts and code, which hides all the payment methods and shows a custom credit card payment… Read More »Magento 2 Payment Method Hacked

How to stop attackers to execute script and run 100 requests to create account?

On client magento website has enabled google captcha version 2 on create account page. exception.log file has following errors (Magento\Framework\Stdlib\Cookie\CookieSizeLimitReachedException(code: 0): Unable to send the cookie. Size of ‘mage-messages’ is 4131 bytes with error message “Invalid google captcha” Above error… Read More »How to stop attackers to execute script and run 100 requests to create account?