Protection from CVE-2024-34102 (Adobe Commerce and Magento Open Source unauthenticated XML entity injection)
An unauthenticated XML entity injection has been found in Adobe Commerce and Magento Open Source and has been assigned CVE-2024-34102. Fastly has created a virtual patch for it that is now available within your account. To activate it and add protection to your services:
- Log in to the Next-Gen WAF control panel. 
- From the Sites menu, select a site if you have more than one site. 
- From the Rules menu, select Templated Rules.
- In the search bar, enter CVE-2024-34102and then click View for the CVE-2024-34102 templated rule.
- Click Configure and then Add trigger.
- Select the Block requests from an IP immediately if the CVE-2024-34102 signal is observed checkbox.
- Click Update rule.