Описание
Shopware default newsletter opt-in settings allow for mass sign-up abuse
Impact
Currently the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation.
Default settings are:
Newsletter: Double Opt-in - active
Newsletter: Double opt-in for registered customers - disabled
Log-in & sign-up: Double opt-in on sign-up - disabled
With these settings, anyone can register an account on the shop using any e-mail-address and then check the check-box in the account page to sign up for the newsletter. The recipient will receive two mails confirming registering and signing up for the newsletter, no confirmation link needed to be clicked for either. In the backend the recipient is set to “instantly active”.
Patches
Update to Shopware 6.6.10.3 or 6.5.8.17
Workarounds
For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
Пакеты
shopware/core
>= 6.6.0.0-rc1, < 6.6.10.3
6.6.10.3
shopware/platform
>= 6.6.0.0-rc1, < 6.6.10.3
6.6.10.3
shopware/platform
>= 6.7.0.0-rc1, < 6.7.0.0-rc2
6.7.0.0-rc2
shopware/core
>= 6.7.0.0-rc1, < 6.7.0.0-rc2
6.7.0.0-rc2
shopware/core
< 6.5.8.17
6.5.8.17
shopware/platform
< 6.5.8.17
6.5.8.17
EPSS
2.7 Low
CVSS4
5.3 Medium
CVSS3
CVE ID
Дефекты
Связанные уязвимости
Shopware is an open source e-commerce software platform. Prior to 6.6.10.3 or 6.5.8.17, the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are Newsletter: Double Opt-in set to active, Newsletter: Double opt-in for registered customers set to disabled, and Log-in & sign-up: Double opt-in on sign-up set to disabled. With these settings, anyone can register an account on the shop using any e-mail-address and then check the check-box in the account page to sign up for the newsletter. The recipient will receive two mails confirming registering and signing up for the newsletter, no confirmation link needed to be clicked for either. In the backend the recipient is set to “instantly active”. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17.
EPSS
2.7 Low
CVSS4
5.3 Medium
CVSS3