Vulnerabilites related to shopware - platform
cve-2021-37711
Vulnerability from cvelistv5
Published
2021-08-16 22:25
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Versions prior to 6.4.3.1 contain an authenticated server-side request forgery vulnerability in file upload via URL. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c= 6.4.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Versions prior to 6.4.3.1 contain an authenticated server-side request forgery vulnerability in file upload via URL. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T22:25:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502" } ], "source": { "advisory": "GHSA-gcvv-gq92-x94r", "discovery": "UNKNOWN" }, "title": "Authenticated server-side request forgery in file upload via URL.", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37711", "STATE": "PUBLIC", "TITLE": "Authenticated server-side request forgery in file upload via URL." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c= 6.4.3.0" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Versions prior to 6.4.3.1 contain an authenticated server-side request forgery vulnerability in file upload via URL. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r" }, { "name": "https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502" } ] }, "source": { "advisory": "GHSA-gcvv-gq92-x94r", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37711", "datePublished": "2021-08-16T22:25:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37709
Vulnerability from cvelistv5
Published
2021-08-16 22:05
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability involving an insecure direct object reference of log files of the Import/Export feature. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.522Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c= 6.4.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability involving an insecure direct object reference of log files of the Import/Export feature. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T22:05:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec" } ], "source": { "advisory": "GHSA-54gp-qff8-946c", "discovery": "UNKNOWN" }, "title": "Insecure direct object reference of log files of the Import/Export feature", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37709", "STATE": "PUBLIC", "TITLE": "Insecure direct object reference of log files of the Import/Export feature" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c= 6.4.3.0" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability involving an insecure direct object reference of log files of the Import/Export feature. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532: Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c" }, { "name": "https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec" } ] }, "source": { "advisory": "GHSA-54gp-qff8-946c", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37709", "datePublished": "2021-08-16T22:05:12", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24745
Vulnerability from cvelistv5
Published
2022-03-09 22:25
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions guest sessions are shared between customers when HTTP cache is enabled. This can lead to inconsistent experiences for guest users. Setups with Varnish are not affected by this issue. This issue has been resolved in version 6.4.8.2. Users unable to upgrade should disable the HTTP Cache.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions guest sessions are shared between customers when HTTP cache is enabled. This can lead to inconsistent experiences for guest users. Setups with Varnish are not affected by this issue. This issue has been resolved in version 6.4.8.2. Users unable to upgrade should disable the HTTP Cache." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-09T22:25:28", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh" } ], "source": { "advisory": "GHSA-jp6h-mxhx-pgqh", "discovery": "UNKNOWN" }, "title": "Guest session is shared between customers in shopware", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24745", "STATE": "PUBLIC", "TITLE": "Guest session is shared between customers in shopware" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.8.2" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions guest sessions are shared between customers when HTTP cache is enabled. This can lead to inconsistent experiences for guest users. Setups with Varnish are not affected by this issue. This issue has been resolved in version 6.4.8.2. Users unable to upgrade should disable the HTTP Cache." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384: Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh" } ] }, "source": { "advisory": "GHSA-jp6h-mxhx-pgqh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24745", "datePublished": "2022-03-09T22:25:28", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37708
Vulnerability from cvelistv5
Published
2021-08-16 19:15
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a command injection vulnerability in mail agent settings. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775 | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c= 6.4.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a command injection vulnerability in mail agent settings. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T19:15:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa" } ], "source": { "advisory": "GHSA-xh55-2fqp-p775", "discovery": "UNKNOWN" }, "title": "Command injection in mail agent settings", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37708", "STATE": "PUBLIC", "TITLE": "Command injection in mail agent settings" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c= 6.4.3.0" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a command injection vulnerability in mail agent settings. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775" }, { "name": "https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa" } ] }, "source": { "advisory": "GHSA-xh55-2fqp-p775", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37708", "datePublished": "2021-08-16T19:15:13", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24748
Vulnerability from cvelistv5
Published
2022-03-09 22:25
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In versions prior to 6.4.8.2 it is possible to modify customers and to create orders without App Permission. This issue is a result of improper api route checking. Users are advised to upgrade to version 6.4.8.2. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr | x_refsource_CONFIRM | |
https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:49.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In versions prior to 6.4.8.2 it is possible to modify customers and to create orders without App Permission. This issue is a result of improper api route checking. Users are advised to upgrade to version 6.4.8.2. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-09T22:25:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0" } ], "source": { "advisory": "GHSA-83vp-6jqg-6cmr", "discovery": "UNKNOWN" }, "title": "Incorrect Authentication in shopware", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24748", "STATE": "PUBLIC", "TITLE": "Incorrect Authentication in shopware" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.8.2" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In versions prior to 6.4.8.2 it is possible to modify customers and to create orders without App Permission. This issue is a result of improper api route checking. Users are advised to upgrade to version 6.4.8.2. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr" }, { "name": "https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0", "refsource": "MISC", "url": "https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0" } ] }, "source": { "advisory": "GHSA-83vp-6jqg-6cmr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24748", "datePublished": "2022-03-09T22:25:09", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:49.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24871
Vulnerability from cvelistv5
Published
2022-04-20 19:05
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2 | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c | x_refsource_MISC | |
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-20T19:05:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022" } ], "source": { "advisory": "GHSA-7gm7-8q8v-9gf2", "discovery": "UNKNOWN" }, "title": "Server-Side Request Forgery (SSRF) in Shopware", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24871", "STATE": "PUBLIC", "TITLE": "Server-Side Request Forgery (SSRF) in Shopware" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.10.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2" }, { "name": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022" } ] }, "source": { "advisory": "GHSA-7gm7-8q8v-9gf2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24871", "datePublished": "2022-04-20T19:05:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32711
Vulnerability from cvelistv5
Published
2021-06-24 20:05
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b | x_refsource_MISC | |
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.3.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-24T20:05:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021" } ], "source": { "advisory": "GHSA-f2vv-h5x4-57gr", "discovery": "UNKNOWN" }, "title": "Leak of information via Store-API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32711", "STATE": "PUBLIC", "TITLE": "Leak of information via Store-API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.3.5.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr" }, { "name": "https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021" } ] }, "source": { "advisory": "GHSA-f2vv-h5x4-57gr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32711", "datePublished": "2021-06-24T20:05:13", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24872
Vulnerability from cvelistv5
Published
2022-04-20 19:15
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c | x_refsource_MISC | |
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022 | x_refsource_MISC | |
https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-20T19:15:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc" } ], "source": { "advisory": "GHSA-9wrv-g75h-8ccc", "discovery": "UNKNOWN" }, "title": "Improper Access Control in shopware", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24872", "STATE": "PUBLIC", "TITLE": "Improper Access Control in shopware" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.10.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022" }, { "name": "https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc" } ] }, "source": { "advisory": "GHSA-9wrv-g75h-8ccc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24872", "datePublished": "2022-04-20T19:15:14", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32709
Vulnerability from cvelistv5
Published
2021-06-24 18:50
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-24T18:50:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32" } ], "source": { "advisory": "GHSA-g7w8-pp9w-7p32", "discovery": "UNKNOWN" }, "title": "Creation of order credits was not validated by acl in admin orders", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32709", "STATE": "PUBLIC", "TITLE": "Creation of order credits was not validated by acl in admin orders" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.1.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32" } ] }, "source": { "advisory": "GHSA-g7w8-pp9w-7p32", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32709", "datePublished": "2021-06-24T18:50:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37707
Vulnerability from cvelistv5
Published
2021-08-16 18:55
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability that allows manipulation of product reviews via API. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c= 6.4.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability that allows manipulation of product reviews via API. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-17T10:03:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be" } ], "source": { "advisory": "GHSA-9f8f-574q-8jmf", "discovery": "UNKNOWN" }, "title": "Manipulation of product reviews via API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37707", "STATE": "PUBLIC", "TITLE": "Manipulation of product reviews via API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c= 6.4.3.0" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability that allows manipulation of product reviews via API. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf" }, { "name": "https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be" } ] }, "source": { "advisory": "GHSA-9f8f-574q-8jmf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37707", "datePublished": "2021-08-16T18:55:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22733
Vulnerability from cvelistv5
Published
2023-01-17 21:37
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions the log module would write out all kind of sent mails. An attacker with access to either the local system logs or a centralized logging store may have access to other users accounts. This issue has been addressed in version 6.4.18.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Users unable to upgrade may remove from all users the log module ACL rights or disable logging.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f" }, { "name": "https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07" }, { "name": "https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.18.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions the log module would write out all kind of sent mails. An attacker with access to either the local system logs or a centralized logging store may have access to other users accounts. This issue has been addressed in version 6.4.18.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Users unable to upgrade may remove from all users the log module ACL rights or disable logging." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T21:37:43.906Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f" }, { "name": "https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07" }, { "name": "https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging", "tags": [ "x_refsource_MISC" ], "url": "https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "source": { "advisory": "GHSA-7cp7-jfp6-jh4f", "discovery": "UNKNOWN" }, "title": "Improper Output Neutralization in Log Module in shopware" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22733", "datePublished": "2023-01-17T21:37:43.906Z", "dateReserved": "2023-01-06T14:21:05.891Z", "dateUpdated": "2024-08-02T10:13:50.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24746
Vulnerability from cvelistv5
Published
2022-03-09 22:25
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6 | x_refsource_MISC | |
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.8.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-09T22:25:23", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022" } ], "source": { "advisory": "GHSA-952p-fqcp-g8pc", "discovery": "UNKNOWN" }, "title": "HTML injection possibility in voucher code form", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24746", "STATE": "PUBLIC", "TITLE": "HTML injection possibility in voucher code form" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.8.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc" }, { "name": "https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022" } ] }, "source": { "advisory": "GHSA-952p-fqcp-g8pc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24746", "datePublished": "2022-03-09T22:25:23", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37710
Vulnerability from cvelistv5
Published
2021-08-16 22:20
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a Cross-Site Scripting vulnerability via SVG media files. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c= 6.4.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a Cross-Site Scripting vulnerability via SVG media files. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T22:20:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423" } ], "source": { "advisory": "GHSA-fc38-mxwr-pfhx", "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting via SVG media files", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37710", "STATE": "PUBLIC", "TITLE": "Cross-Site Scripting via SVG media files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c= 6.4.3.0" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a Cross-Site Scripting vulnerability via SVG media files. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx" }, { "name": "https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423" } ] }, "source": { "advisory": "GHSA-fc38-mxwr-pfhx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37710", "datePublished": "2021-08-16T22:20:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32716
Vulnerability from cvelistv5
Published
2021-06-24 21:05
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb | x_refsource_MISC | |
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-24T21:05:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021" } ], "source": { "advisory": "GHSA-gpmh-g94g-qrhr", "discovery": "UNKNOWN" }, "title": "Internal hidden fields are visible on to many associations in admin api", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32716", "STATE": "PUBLIC", "TITLE": "Internal hidden fields are visible on to many associations in admin api" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.1.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr" }, { "name": "https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021" } ] }, "source": { "advisory": "GHSA-gpmh-g94g-qrhr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32716", "datePublished": "2021-06-24T21:05:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24747
Vulnerability from cvelistv5
Published
2022-03-09 22:25
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. Affected versions of shopware do no properly set sensitive HTTP headers to be non-cacheable. If there is an HTTP cache between the server and client then headers may be exposed via HTTP caches. This issue has been resolved in version 6.4.8.2. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f | x_refsource_MISC | |
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.206Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. Affected versions of shopware do no properly set sensitive HTTP headers to be non-cacheable. If there is an HTTP cache between the server and client then headers may be exposed via HTTP caches. This issue has been resolved in version 6.4.8.2. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-09T22:25:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022" } ], "source": { "advisory": "GHSA-6wrh-279j-6hvw", "discovery": "UNKNOWN" }, "title": "HTTP caching is marking private HTTP headers as public", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24747", "STATE": "PUBLIC", "TITLE": "HTTP caching is marking private HTTP headers as public" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.8.2" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. Affected versions of shopware do no properly set sensitive HTTP headers to be non-cacheable. If there is an HTTP cache between the server and client then headers may be exposed via HTTP caches. This issue has been resolved in version 6.4.8.2. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw" }, { "name": "https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022" } ] }, "source": { "advisory": "GHSA-6wrh-279j-6hvw", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24747", "datePublished": "2022-03-09T22:25:16", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22734
Vulnerability from cvelistv5
Published
2023-01-17 21:21
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Shopware is an open source commerce platform based on Symfony Framework and Vue js. The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process. As a result operators may have inconsistencies in their newsletter systems. This problem has been fixed with version 6.4.18.1. Users are advised to upgrade. Users unable to upgrade may find security measures are available via a plugin for major versions 6.1, 6.2, and 6.3. Users may also disable newsletter registration completely.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2" }, { "name": "https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.18.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source commerce platform based on Symfony Framework and Vue js. The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process. As a result operators may have inconsistencies in their newsletter systems. This problem has been fixed with version 6.4.18.1. Users are advised to upgrade. Users unable to upgrade may find security measures are available via a plugin for major versions 6.1, 6.2, and 6.3. Users may also disable newsletter registration completely.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T21:21:23.973Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2" }, { "name": "https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "source": { "advisory": "GHSA-46h7-vj7x-fxg2", "discovery": "UNKNOWN" }, "title": "Improper Input Newsletter subscription option validation in shopware" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22734", "datePublished": "2023-01-17T21:21:23.973Z", "dateReserved": "2023-01-06T14:21:05.891Z", "dateUpdated": "2024-08-02T10:13:50.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32710
Vulnerability from cvelistv5
Published
2021-06-24 19:45
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.3.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-24T19:45:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e" } ], "source": { "advisory": "GHSA-h9q8-5gv2-v6mg", "discovery": "UNKNOWN" }, "title": "Potential Session Hijacking in Shopware", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32710", "STATE": "PUBLIC", "TITLE": "Potential Session Hijacking in Shopware" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.3.5.2" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384: Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg" }, { "name": "https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e" } ] }, "source": { "advisory": "GHSA-h9q8-5gv2-v6mg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32710", "datePublished": "2021-06-24T19:45:17", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22732
Vulnerability from cvelistv5
Published
2023-01-17 21:34
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Shopware is an open source commerce platform based on Symfony Framework and Vue js. The Administration session expiration was set to one week, when an attacker has stolen the session cookie they could use it for a long period of time. In version 6.4.18.1 an automatic logout into the Administration session has been added. As a result the user will be logged out when they are inactive. Users are advised to upgrade. There are no known workarounds for this issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-59qg-93jg-236f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-59qg-93jg-236f" }, { "name": "https://github.com/shopware/platform/commit/cd7a89cbcd3a0428c6d1ef27b3aa15467a722ff6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/cd7a89cbcd3a0428c6d1ef27b3aa15467a722ff6" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.18.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source commerce platform based on Symfony Framework and Vue js. The Administration session expiration was set to one week, when an attacker has stolen the session cookie they could use it for a long period of time. In version 6.4.18.1 an automatic logout into the Administration session has been added. As a result the user will be logged out when they are inactive. Users are advised to upgrade. There are no known workarounds for this issue.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T21:34:26.912Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-59qg-93jg-236f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-59qg-93jg-236f" }, { "name": "https://github.com/shopware/platform/commit/cd7a89cbcd3a0428c6d1ef27b3aa15467a722ff6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/cd7a89cbcd3a0428c6d1ef27b3aa15467a722ff6" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "source": { "advisory": "GHSA-59qg-93jg-236f", "discovery": "UNKNOWN" }, "title": "Insufficient Session Expiration in Administration in shopware" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22732", "datePublished": "2023-01-17T21:34:26.912Z", "dateReserved": "2023-01-06T14:21:05.891Z", "dateUpdated": "2024-08-02T10:13:50.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32717
Vulnerability from cvelistv5
Published
2021-06-24 21:10
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
References
▼ | URL | Tags |
---|---|---|
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021 | x_refsource_MISC | |
https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v | x_refsource_CONFIRM | |
https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-24T21:10:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3" } ], "source": { "advisory": "GHSA-vrf2-xghr-j52v", "discovery": "UNKNOWN" }, "title": "Private files publicly accessible with Cloud Storage providers", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32717", "STATE": "PUBLIC", "TITLE": "Private files publicly accessible with Cloud Storage providers" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.1.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021" }, { "name": "https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v" }, { "name": "https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3", "refsource": "MISC", "url": "https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3" } ] }, "source": { "advisory": "GHSA-vrf2-xghr-j52v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32717", "datePublished": "2021-06-24T21:10:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22731
Vulnerability from cvelistv5
Published
2023-01-17 21:31
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Shopware is an open source commerce platform based on Symfony Framework and Vue js. In a Twig environment **without the Sandbox extension**, it is possible to refer to PHP functions in twig filters like `map`, `filter`, `sort`. This allows a template to call any global PHP function and thus execute arbitrary code. The attacker must have access to a Twig environment in order to exploit this vulnerability. This problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished. Users are advised to upgrade. Users of major versions 6.1, 6.2, and 6.3 may also receive this fix via a plugin.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w" }, { "name": "https://github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.18.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source commerce platform based on Symfony Framework and Vue js. In a Twig environment **without the Sandbox extension**, it is possible to refer to PHP functions in twig filters like `map`, `filter`, `sort`. This allows a template to call any global PHP function and thus execute arbitrary code. The attacker must have access to a Twig environment in order to exploit this vulnerability. This problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished. Users are advised to upgrade. Users of major versions 6.1, 6.2, and 6.3 may also receive this fix via a plugin.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T21:31:45.875Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w" }, { "name": "https://github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "source": { "advisory": "GHSA-93cw-f5jj-x85w", "discovery": "UNKNOWN" }, "title": "Improper Control of Generation of Code in Twig rendered views in shopware" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22731", "datePublished": "2023-01-17T21:31:45.875Z", "dateReserved": "2023-01-06T14:21:05.891Z", "dateUpdated": "2024-08-02T10:13:50.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22730
Vulnerability from cvelistv5
Published
2023-01-17 21:27
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions It was possible to put the same line item multiple times in the cart using the AP. The Cart Validators checked the line item's individuality and the user was able to bypass quantity limits in sales. This problem has been fixed with version 6.4.18.1. Users on major versions 6.1, 6.2, and 6.3 may also obtain this fix via a plugin.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-8r6h-m72v-38fg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-8r6h-m72v-38fg" }, { "name": "https://github.com/shopware/platform/commit/4fce12096e54b2033832d9104fa2e68888c2b4e9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shopware/platform/commit/4fce12096e54b2033832d9104fa2e68888c2b4e9" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.18.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions It was possible to put the same line item multiple times in the cart using the AP. The Cart Validators checked the line item\u0027s individuality and the user was able to bypass quantity limits in sales. This problem has been fixed with version 6.4.18.1. Users on major versions 6.1, 6.2, and 6.3 may also obtain this fix via a plugin. \n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T21:27:50.656Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-8r6h-m72v-38fg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-8r6h-m72v-38fg" }, { "name": "https://github.com/shopware/platform/commit/4fce12096e54b2033832d9104fa2e68888c2b4e9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shopware/platform/commit/4fce12096e54b2033832d9104fa2e68888c2b4e9" }, { "name": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates" } ], "source": { "advisory": "GHSA-8r6h-m72v-38fg", "discovery": "UNKNOWN" }, "title": "Improper Input Validation of Clearance sale in cart" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22730", "datePublished": "2023-01-17T21:27:50.656Z", "dateReserved": "2023-01-06T14:21:05.891Z", "dateUpdated": "2024-08-02T10:13:50.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24744
Vulnerability from cvelistv5
Published
2022-03-09 22:25
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions user sessions are not logged out if the password is reset via password recovery. This issue has been resolved in version 6.4.8.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "platform", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003c 6.4.8.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions user sessions are not logged out if the password is reset via password recovery. This issue has been resolved in version 6.4.8.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-09T22:25:33", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555" } ], "source": { "advisory": "GHSA-w267-m9c4-8555", "discovery": "UNKNOWN" }, "title": "Insufficient Session Expiration in shopware", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24744", "STATE": "PUBLIC", "TITLE": "Insufficient Session Expiration in shopware" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "platform", "version": { "version_data": [ { "version_value": "\u003c 6.4.8.1" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions user sessions are not logged out if the password is reset via password recovery. This issue has been resolved in version 6.4.8.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-613: Insufficient Session Expiration" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555", "refsource": "CONFIRM", "url": "https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555" } ] }, "source": { "advisory": "GHSA-w267-m9c4-8555", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24744", "datePublished": "2022-03-09T22:25:33", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }