| ||||||||||
Shopping cart software Solutions for online shops and malls | ||||||||||
|
#111
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Ksenia (or anyone else),
What if any patches need to be made to 4.1.8 connecting to PayPal for credit card processing? I've read through each page of this thread and am not coming up with a clear answer. Thanks! Quote:
__________________
X-Cart Gold v. 4.1.8 Customized by Ryan Design Studio AOM SEO Mod |
|||||||
#112
|
|||||||||
|
|||||||||
Re: POODLE vulnerability in SSLv3
Hi When you says 'Paypal Advanced' does this cover paypal express and not paypal standard.
Or is this for paypal login only? |
|||||||||
#113
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
Do you have the stock 4.1.8 https modules ? include/func/func.https_curl.php include/func/func.https_openssl.php include/func/func.https_libcurl.php include/func/func.https_ssleay.php Do you have the 'use_ssl' string in the files ? Code:
__________________
Sincerely yours, Ildar Amankulov Head of Maintenance group |
|||||||
|
#114
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
This is PayPal Advanced payment method only.
__________________
Sincerely yours, Ildar Amankulov Head of Maintenance group |
|||||||
#115
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
Thank you - let me check.
__________________
X-Cart Gold v. 4.1.8 Customized by Ryan Design Studio AOM SEO Mod |
|||||||
#116
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
I oened each of these through CPanel file manager and did a Find on use_ssl - could not find it in the code. Does this mean we are safe? Thanks for your time.
__________________
X-Cart Gold v. 4.1.8 Customized by Ryan Design Studio AOM SEO Mod |
|||||||
#117
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
You are safe.
__________________
Sincerely yours, Ildar Amankulov Head of Maintenance group |
|||||||
|
#118
|
|||||||||
|
|||||||||
Re: POODLE vulnerability in SSLv3
Yesterday we disabled SSLv3 at X-Payments servers.
__________________
Sincerely yours, Alex Mulin VP of Business Development for X-Cart X-Payments product manager |
|||||||||
#119
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
thank you sir!
__________________
X-Cart Gold v. 4.1.8 Customized by Ryan Design Studio AOM SEO Mod |
|||||||
#120
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Help. X-Pay stopped working when SSL3 was disabled.
Xcart 4.5.5 Applied remove ssl3 patch # curl -V curl 7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.16.1 Basic ECC zlib/1.2.3 libidn/1.18 libssh2/1.4.2 Protocols: tftp ftp telnet dict ldap ldaps http file https ftps scp sftp Features: GSS-Negotiate IDN IPv6 Largefile NTLM SSL libz logged error: [23-Nov-2014 00:06:19] PAYMENTS message: Payment processing failure. Login: xxxxxx@gmail.com IP: xx.x.xx.xxx ---- Payment method: X-Payments: Authorize.Net AIM (X-Payments: Authorize.Net AIM) bill_output = Array ( [cvvmes] => not set / [code] => 2 [billmes] => Internal error (Response is not valid.<br />Check logs.) ) original_bill_output = Array ( [cvvmes] => not set / [code] => 2 [billmes] => Internal error (Response is not valid.<br />Check logs.) ) Request URI: /payment/payment_cc.php Backtrace: /payment/payment_ccmid.php:459 /payment/payment_ccend.php:48 /payment/payment_cc.php:342
__________________
x-cart 4.5.5 Gold |
|||||||
|
|||
X-Cart forums © 2001-2020
|