You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Magento version - 2.4.6-P8
Environment - Local, Staging and Production
Steps to reproduce
My client is using Akamai Nonames to scan the application for PII in the incoming Rest API calls and if there (like cusotmer email address) Akamai is flagging it as security vulnerability and reporting it as a bug for the developers to fix it.
For example, the following Rest API is called by headless to Adobe Commerce where they are fetching the all the orders for the customers based on their email address to display it in the order history page...since the customer email address is exists in the query parameter Nonames system is flagging it as security vulnerability and report it as high risk.
Hi @shrinisadagopan. Thank you for your report.
To speed up processing of this issue, make sure that the issue is reproducible on the vanilla Magento instance following Steps to reproduce.
Add a comment to assign the issue: @magento I am working on this
To learn more about issue processing workflow, refer to the Code Contributions.
Join Magento Community Engineering Slack and ask your questions in #github channel. ⚠️ According to the Magento Contribution requirements, all issues must go through the Community Contributions Triage process. Community Contributions Triage is a public meeting.
🕙 You can find the schedule on the Magento Community Calendar page.
📞 The triage of issues happens in the queue order. If you want to speed up the delivery of your contribution, join the Community Contributions Triage session to discuss the appropriate ticket.
Preconditions and environment
Magento version - 2.4.6-P8
Environment - Local, Staging and Production
Steps to reproduce
My client is using Akamai Nonames to scan the application for PII in the incoming Rest API calls and if there (like cusotmer email address) Akamai is flagging it as security vulnerability and reporting it as a bug for the developers to fix it.
For example, the following Rest API is called by headless to Adobe Commerce where they are fetching the all the orders for the customers based on their email address to display it in the order history page...since the customer email address is exists in the query parameter Nonames system is flagging it as security vulnerability and report it as high risk.
/rest/V1/orders?searchCriteria[filterGroups][0][filters][0][conditionType]=eq&searchCriteria[filterGroups][0][filters][0][field]=customer_email&searchCriteria[filterGroups][0][filters][0][value][=[email protected]]
Expected result
Akamai Nonames scan should not find any PII information in the Rest API calls
Actual result
Akamai Nonames scan is finding the PII information in the Rest API calls and flagging it as security vulnerability.
Additional information
No response
Release note
No response
Triage and priority
The text was updated successfully, but these errors were encountered: