Lucene search

K
githubGitHub Advisory DatabaseGHSA-7V2V-9RM4-7M8F
HistoryApr 18, 2023 - 1:14 p.m.

Improper Control of Generation of Code in Twig rendered views

2023-04-1813:14:20
CWE-94
CWE-1336
GitHub Advisory Database
github.com
17
twig filters execution
php closures
security updates
shopware version
security measures
code generation

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.9%

Impact

We fixed with CVE-2023-22731 Twig filters to only be executed with allowed functions. It is possible to pass PHP Closures as string or an array and array crafted PHP Closures was not checked against allow list

Patches

The problem has been fixed with 6.4.20.1 with an improved override.

Workarounds

For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

References

https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023?category=security-updates

Affected configurations

Vulners
Node
shopwareshopwareRange6.4.20.0
OR
shopwareshopwareRange6.4.20.0

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.9%