51ºÚÁϲ»´òìÈ

51ºÚÁϲ»´òìÈ Commerce 2.4.7-p4 HIPAA 1.2.0 compatibility package Hotfix

This article provides a hotfix to add compatibility for the new HIPAA package 1.2.0 with 51ºÚÁϲ»´òìÈ Commerce on Cloud infrastructure 2.4.7-p4.

The issue will be fixed in the version 2.4.7-p5 release.

Affected versions and products

51ºÚÁϲ»´òìÈ Commerce on Cloud infrastructure 2.4.7-p4 and earlier

Prerequisites

  • 51ºÚÁϲ»´òìÈ has provisioned your 51ºÚÁϲ»´òìÈ Commerce account to access the HIPAA Ready extension. See HIPAA readiness on 51ºÚÁϲ»´òìÈ Commerce for more details in our 51ºÚÁϲ»´òìÈ Commerce: Getting Started Guide.
  • Access to to install the extension. For key generation and obtaining the necessary rights, see Get your authentication keys in our 51ºÚÁϲ»´òìÈ Commerce: Installation Guide.

Issue

The HIPAA package 1.1.0 isn’t compatible with 51ºÚÁϲ»´òìÈ Commerce 2.4.7x release line.

Solution

Through this hotfix, merchants who are running 51ºÚÁϲ»´òìÈ Commerce on Cloud infrastructure 2.4.7-p4 will able to use the HIPAA package 1.2.0.

NOTE
HIPAA 1.2.0 is compatible with 51ºÚÁϲ»´òìÈ Commerce 2.4.7-p5 only. If you want to add compatibility with HIPAA 1.2.0 to 51ºÚÁϲ»´òìÈ Commerce 2.4.7-p4, please install the provided patch.
If you aren’t on 51ºÚÁϲ»´òìÈ Commerce 2.4.7-p4, you must first upgrade to 51ºÚÁϲ»´òìÈ Commerce 2.4.7-p4 in order to use this patch.

To fix the issue for 51ºÚÁϲ»´òìÈ Commerce on Cloud infrastructure 2.4.7-p4, you should apply the patch:

²¹³¦-13382â€Ëð²¹³Ù³¦³ó-´Ú´Ç°ù-³ó¾±±è²¹²¹-2-4-7-±è4-³¦´Ç³¾±è´Ç²õ±ð°ù-±è²¹³Ù³¦³ó.³ú¾±±è

How to apply the patch

Unzip the file and see How to apply a composer patch provided by 51ºÚÁϲ»´òìÈ in our support knowledge base for instructions.

For 51ºÚÁϲ»´òìÈ Commerce on Cloud merchants only - How to tell whether the patch has been applied

Considering that it isn’t possible to easily check if the issue was patched, you might want to check whether the patch has been successfully applied.

NOTE
You can do this by following these steps, using the file VULN-27015-2.4.7_COMPOSER.patch as an Example:
  1. Install the Quality Patches Tool.

  2. Run the command:

    cve-2024-34102-tell-if-patch-applied-code

  3. You should see output similar to this, where the Example used here, VULN-27015, returns the  Applied  s³Ù²¹³Ù³Ü²õ:

    code language-bash
    ║ Id            │ Title                                                        │ Category        │ Origin                 │ Status      │ Details                                          ║ ║ N/A           │ ../m2-hotfixes/VULN-27015-2.4.7_COMPOSER_patch.patch      │ Other           │ Local                  │ Applied     │ Patch type: Custom
    
recommendation-more-help
8bd06ef0-b3d5-4137-b74e-d7b00485808a