Lucene search

K
githubGitHub Advisory DatabaseGHSA-QC43-PGWQ-3Q2Q
HistorySep 16, 2022 - 9:01 p.m.

Shopware access control list bypassed via crafted specific URLs

2022-09-1621:01:29
CWE-281
GitHub Advisory Database
github.com
12
shopware
acl bypass
crafted urls
update
version 5.7.15
security plugin

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.5%

Impact

If backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do.

Patches

We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-15

For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html

References

https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022

Affected configurations

Vulners
Node
shopwareshopwareRange5.7.14
CPENameOperatorVersion
shopware/shopwarele5.7.14

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.5%

Related for GHSA-QC43-PGWQ-3Q2Q