Skip to main content

Release V9.2.6.7

Security Enhancements

Security fixes implemented in this release:


FIX

Data Security: PAN Data Exposure in Admin Console API Response Logs Display

[GA-1534]

Context: When viewing transaction logs in the Admin Console, some API responses related to detokenization requests were displaying unmasked PAN data in cleartext, creating a potential security risk and PCI DSS compliance issue.

Solution: Implemented comprehensive response data sanitization that automatically masks sensitive information in API response logs before storing them in the database, while preserving the original data flow for legitimate processing.

Impact: Enhanced security for cardholder data with no change to system functionality. When viewing logs in the System Console, sensitive card data now appears properly masked, preventing unauthorized access to this information.

System Changes Overview

  • Database Changes: No schema changes; data sanitization is now performed before storing in the charge_transaction_log table
  • Configuration Changes: None required
  • Code Changes: Enhanced GatesLogger and HTTPFormGates classes to implement sensitive data masking
  • Filesystem Changes: None
  • Data Migration: None required for new transactions; existing sensitive data will be addressed separately

Update Actions Analysis

Update actions are not required for this change

  • The security enhancement is implemented entirely through code modifications
  • No configuration parameters need to be updated
  • The fix is applied automatically to all new API response logs
  • Existing data cleanup will be handled as a separate process

Implementation Actions

  • Modified the GatesLogger class to identify and mask sensitive data in response logs
  • Added detection for detokenization request types to prevent logging them
  • Implemented special handling for account numbers using FormatHelper.formatAccount
  • Applied data truncation for excessively long values to improve performance

Fixes

The following fixes have been implemented in this release:


FIX

Fixed AMEX Transaction Processing in Merchant Warrior Integration

[UP-728]

Context: AMEX transactions processed through the Merchant Warrior integration were failing with "Data truncation" errors because the authorization code field was too small to accommodate the 15-digit Transaction Identifier used by AMEX.

Solution: Implemented database schema modifications to increase the AUTH_CODE field size and improved parsing logic to properly handle AMEX-specific response formats.

Impact: Merchants can now process AMEX cards through the Merchant Warrior integration without system errors, and all transactions are properly recorded regardless of approval status.

System Changes Overview

  • Database Changes: Modified AUTH_CODE field in MWE_AUTH_RETAIL_TRANSACTION table from VARCHAR(12) to VARCHAR(15)
  • Configuration Changes: Updated Hibernate mappings for the MweAuthRetailTransaction entity
  • Code Changes: Enhanced parsing logic to properly truncate values and handle AMEX-specific data formats
  • Filesystem Changes: None
  • Data Migration Needs: None beyond automatic schema update

Update Actions Analysis

Update actions are not required for this fix.

  • The database schema changes are handled automatically during deployment
  • The code changes are self-contained within the core application
  • No configuration files need to be manually modified
  • No data migration scripts need to be run separately

Implementation Actions

  • Deploy the application with the updated database schema
  • Restart the application to apply the changes
  • No manual intervention is required
  • No additional configuration is needed

FIX

Enhanced Field Capacity for Merchant Statement Statistics

[UP-741]

Context: Merchant statement statistics processing failed for high-volume accounts due to numeric field size limitations in the database, causing critical task failures in the Remittance module.

Solution: Increased the capacity of all balance and amount fields in the merchant statement statistics tables by changing their data types from INTEGER to BIGINT, providing significantly higher value limits.

Impact: The system can now correctly process and store statistics for merchants with high transaction volumes without encountering numerical overflow errors, ensuring stable operation of the merchant statistics services.

System Changes Overview

  • Database Changes: Modified field types in IAPP_MERCHANT_STATEMENT_STATISTICS and IAPP_MERCHANT_STATEMENT_STATISTICS_DETAIL tables, changing multiple numeric fields from INTEGER to BIGINT
  • Configuration Changes: None
  • Code Changes: Updated report templates and field mappings for Monthly Processing Statement reports
  • Filesystem Changes: Updated jasper report files in the reporting module
  • Data Migration: No data migration required as BIGINT is compatible with existing INTEGER values

Update Actions Analysis

No update actions are required because:

  • All necessary changes are implemented through standard database deltas
  • Field type modifications are forward-compatible with existing data
  • Application code and report templates are updated within the standard deployment process
  • No manual data migration or configuration changes are needed

Implementation Actions

  • Deploy database deltas to increase field sizes in production database tables
  • Update application code with modified report templates
  • Monitor statistics processing jobs after deployment to verify successful processing
  • Verify report generation for affected merchants