Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-36102
HistorySep 12, 2022 - 8:00 p.m.

CVE-2022-36102 Acess control list bypassed via crafted specific URLs

2022-09-1220:00:24
CWE-281
GitHub_M
www.cve.org
shopware
acl bypass
crafted urls
cve-2022-36102
update
auto-updater

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

0.004 Low

EPSS

Percentile

72.5%

Shopware is an open source e-commerce software. In affected versions if backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. Users are advised to update to the current version (5.7.15). Users can get the update via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "shopware",
    "vendor": "shopware",
    "versions": [
      {
        "status": "affected",
        "version": "< 5.7.15"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

0.004 Low

EPSS

Percentile

72.5%

Related for CVELIST:CVE-2022-36102