CVE-2022-24879
Vulnerability from cvelistv5
Published
2022-04-28 14:15
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Shopware is an open source e-commerce software platform. Versions prior to 5.7.9 are vulnerable to malfunction of cross-site request forgery (CSRF) token validation. Under certain circumstances, the CSRF tokens were not generated anew and not validated correctly. This issue is fixed in version 5.7.9. Users of older versions may attempt to mitigate the vulnerability by using the Shopware security plugin.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.shopware.com/en/changelog-sw5/#5-7-9" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "shopware", "vendor": "shopware", "versions": [ { "status": "affected", "version": "\u003e= 5.2.0, \u003c 5.7.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Shopware is an open source e-commerce software platform. Versions prior to 5.7.9 are vulnerable to malfunction of cross-site request forgery (CSRF) token validation. Under certain circumstances, the CSRF tokens were not generated anew and not validated correctly. This issue is fixed in version 5.7.9. Users of older versions may attempt to mitigate the vulnerability by using the Shopware security plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-28T14:15:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.shopware.com/en/changelog-sw5/#5-7-9" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h" } ], "source": { "advisory": "GHSA-pf38-v6qj-j23h", "discovery": "UNKNOWN" }, "title": "Malfunction of Cross-Site Request Forgery token validation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24879", "STATE": "PUBLIC", "TITLE": "Malfunction of Cross-Site Request Forgery token validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "shopware", "version": { "version_data": [ { "version_value": "\u003e= 5.2.0, \u003c 5.7.9" } ] } } ] }, "vendor_name": "shopware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shopware is an open source e-commerce software platform. Versions prior to 5.7.9 are vulnerable to malfunction of cross-site request forgery (CSRF) token validation. Under certain circumstances, the CSRF tokens were not generated anew and not validated correctly. This issue is fixed in version 5.7.9. Users of older versions may attempt to mitigate the vulnerability by using the Shopware security plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352: Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022", "refsource": "MISC", "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022" }, { "name": "https://www.shopware.com/en/changelog-sw5/#5-7-9", "refsource": "MISC", "url": "https://www.shopware.com/en/changelog-sw5/#5-7-9" }, { "name": "https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h", "refsource": "CONFIRM", "url": "https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h" } ] }, "source": { "advisory": "GHSA-pf38-v6qj-j23h", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24879", "datePublished": "2022-04-28T14:15:14", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-24879\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-04-28T15:15:09.957\",\"lastModified\":\"2024-11-21T06:51:18.403\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Shopware is an open source e-commerce software platform. Versions prior to 5.7.9 are vulnerable to malfunction of cross-site request forgery (CSRF) token validation. Under certain circumstances, the CSRF tokens were not generated anew and not validated correctly. This issue is fixed in version 5.7.9. Users of older versions may attempt to mitigate the vulnerability by using the Shopware security plugin.\"},{\"lang\":\"es\",\"value\":\"Shopware es una plataforma de software de comercio electr\u00f3nico de c\u00f3digo abierto. Las versiones anteriores a 5.7.9 son vulnerables a un funcionamiento inapropiado de la comprobaci\u00f3n de tokens de tipo cross-site request forgery (CSRF). En determinadas circunstancias, los tokens de tipo CSRF no eran generados de nuevo y no son comprobados correctamente. Este problema ha sido corregido en la versi\u00f3n 5.7.9. Los usuarios de versiones anteriores pueden intentar mitigar la vulnerabilidad al usar el plugin de seguridad de Shopware\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2.0\",\"versionEndExcluding\":\"5.7.9\",\"matchCriteriaId\":\"F58D93EE-91AC-46E4-AC31-E617763B6181\"}]}]}],\"references\":[{\"url\":\"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.shopware.com/en/changelog-sw5/#5-7-9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.shopware.com/en/changelog-sw5/#5-7-9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.