此php脚本可能有助于识别受建议的SUPEE-6788补丁影响的Magento代码。
这绝对不是针对此修补程序的万无一失的安全检查,但是对于快速扫描安装中受影响的模块和代码可能很有用。
使用以下命令安装脚本
wget https://raw.githubusercontent.com/gaiterjones/magento-appsec-file-check/master/magento_appsec_file_check.php
编辑您的Magento安装路径
$_magentoPath='/home/www/magento/';
跑
php magento_appsec_file_check.php
受影响的文件将显示:
*** Magento security file check ***
[1] APPSEC-1034, addressing bypassing custom admin URL
2 effected files :
<use>admin</use> found in app/code/community/Itabs/Debit/etc/config.xml
<use>admin</use> found in app/code/core/Mage/Adminhtml/etc/config.xml
[2] APPSEC-1063, addressing possible SQL injection
2 effected files :
collection->addFieldToFilter(' found in app/code/community/Itabs/Debit/Model/Export/Abstract.php
collection->addFieldToFilter(' found in app/code/community/Itabs/Debit/controllers/Adminhtml/OrderController.php
collection->addFieldToFilter(' not found.
collection->addFieldToFilter('\` not found.
collection->addFieldToFilter('\` not found.
[3] APPSEC-1057, template processing method allows access to private information
{{config path= not found.
{{block type= not found.
***********************************
该脚本使用grep在Magento文件中搜索代码的出现情况,这些代码可能会在应用SUPEE-6788时破坏与自定义项或扩展名的向后兼容性。