Lucene search

K
githubGitHub Advisory DatabaseGHSA-8R6H-M72V-38FG
HistoryJan 17, 2023 - 11:57 p.m.

Shopware vulnerable to Improper Input Validation of Clearance sale in cart

2023-01-1723:57:23
CWE-20
GitHub Advisory Database
github.com
11
shopware
improper input validation
clearance sale
api
cart validators
patches
security measures
plugin
newsletter registration
update.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

28.7%

Impact

It is possible to put the same line item multiple one in the cart using API, the Cart Validators checked the line item’s individuality and the user was able to skip the clearance sale in cart

Patches

The problem has been fixed with 6.4.18.1

Workarounds

For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Or disable the newsletter registration completely.

References

https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates

Affected configurations

Vulners
Node
shopwareshopwareRange6.4.18.0
OR
shopwareshopwareRange6.4.18.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

28.7%

Related for GHSA-8R6H-M72V-38FG