Jump to content

Al Brookbanks

Staff
  • Posts

    6,609
  • Joined

  • Last visited

  • Days Won

    122

Posts posted by Al Brookbanks

  1. Add these fields to the includes/global.inc.php file with correct values. Please note that your skin may need changes if you are not using the default Foundation theme. 

    $glob['es_h']                      = '';               // Elasticsearch host e.g. https://localhost:9200
    $glob['es_u']                      = '';               // Elasticserch username
    $glob['es_p']                      = '';               // Elasticsearch password
    $glob['es_i']                        = '';               // Elasticsearch index name
    $glob['es_v']                      = '';               // Elasticsearch vertificate validation enum('1','0')
    $glob['es_c']                       = '';               // Elasticsearch certificate path

    The last two fields can probably remain empty. 

  2. Try setting the values in the includes/global.inc.php file (in most cases the last two can be ignored):

    $glob['es_h']                      = '';               // Elasticsearch host e.g. https://localhost:9200

    $glob['es_u']                      = '';               // Elasticserch username

    $glob['es_p']                      = '';               // Elasticsearch password

    $glob['es_i']                        = '';               // Elasticsearch index name

    $glob['es_v']                      = '';               // Elasticsearch vertificate validation enum('1','0')

    $glob['es_c']                       = '';               // Elasticsearch certificate path

  3. 39 minutes ago, harrisorganic said:

    "If you want to you can choose to only accept payments that pass 3D secure." Thats a good idea. 

    Small business owners don't need the hassle of chargebacks, especially when it can be large amounts of $.

    I found the checkbox for 3D secure in the Square application.

    Thanks Al.

    Tell me about it. CubeCart has had it's fair share of chargebacks too. :) 

    I hope you don't get more. 

  4. Did this transaction pass 3D secure? If so I believe it should be protected and you shouldn't be liable to chargeback fees. 

    Our PayPal integration has much more granular settings. If you want to you can choose to only accept payments that pass 3D secure. With that setting enabled you are never liable to chargeback fees. The square extension could have this feature added.

  5. 11 minutes ago, Debyink said:

    it happens when someone purchases the last of a product in stock

    Thanks I don't need to see the request log. I've worked with another merchant who has had this issue on rare occasions. I've spent uncountable hours trying to work out what in earth is happening.

    This is a scenario that I haven't tried!! Easy to reproduce so I'll do this early next week.

    Sorry about this. Terribly frustrating but if you are right then it should be something I can resolve (hopefully without too much difficulty).

  6. Just now, Debyink said:

    I mentioned about this in June, my customers were being sent back to my store after making payment only to be advised it hadn't and then paid again which created a second new order number.

    Have lost lots of £££'s because as mentioned paypal do not refund the transaction fees, not only that customers email me - annoyed I have taken payment twice, even though it's not me.

    As fas as I am aware this was an uncommon issue that hasn't raised it's head since recent versions that addressed it. In particular there was a JavaScript redirect that could fail. We added a "if this page doesn't redirect click here" message to help move it along. There have been other enhancements but I can't recall what was done. 

    This shouldn't happen with the latest version but if it does we can't fix it without steps to reproduce the issue. 

  7. Many thanks to Gen Sato from Mitsui Bussan Secure Directions, Inc. for responsibly reporting a number of security issues found in all version of CubeCart up to 6.5.3. Please note that these vulnerabilities are executable if a bad actor has authenticated into the back end of the victims store.

    Vulnerabilities

    1. Directory traversal (any file download) - GitHub Issue #3410 
    2. Directory traversal (deletion of arbitrary files and directories) - GitHub Issue #3409
    3. CSRF bypassing CSRF token checks - GitHub Issue #3408
    4. OS Command Injection - This vulnerability concerns the ability for the Smarty template engine to be able to execute dangerous functions.

      e.g. 
      {system('echo ^<?php phpinfo(); > C:/xampp/htdocs/testout.php')}

      No patch has been created for this vulnerability but instead we strongly recommend disabling dangerous PHP functions as recommended by our free CubeCart Security Suite. We suggest disabling the following PHP functions with your php.ini file then restarting the web server. 

      disable_functions = exec, system, passthru, pcntl_exec, popen, proc_open, shell_exec

    This release also patches a number of other maintenance updates

    Upgrading to 6.5.3 is highly recommended. If for some reason you are unable to upgrade to this version it is possible to find the code patches for each vulnerability within each GitHub issue above. If you require help, technical support is available. 

    Download: CubeCart-6.5.3.zip

     

×
×
  • Create New...