Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-55rf-8q29-4g43

Опубликовано: 17 июл. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Sylius has a security vulnerability via adjustments API endpoint

Impact

A security vulnerability was discovered in the /api/v2/shop/adjustments/{id} endpoint, which retrieves order adjustments based on incremental integer IDs. The vulnerability allows an attacker to enumerate valid adjustment IDs and retrieve order tokens. Using these tokens, an attacker can access guest customer order details - sensitive guest customer information.

Patches

The issue is fixed in versions: 1.12.19, 1.13.4 and above. The /api/v2/shop/adjustments/{id} will always return 404 status.

Workarounds

Using YAML configuration:

Create config/api_platform/Adjustment.yaml file:

# config/api_platform/Adjustment.yaml '%sylius.model.adjustment.class%': itemOperations: shop_get: controller: ApiPlatform\Core\Action\NotFoundAction read: false output: false

Or using XML configuration:

Copy the original configuration from vendor:

cp vendor/sylius/sylius/src/Sylius/Bundle/ApiBundle/Resources/config/api_resources/Adjustment.xml config/api_platform

And change the shop_get operation in copied config/api_platform/Adjustment.xml file:

<!-- config/api_platform/Adjustment.xml --> ... <itemOperation name="shop_get"> <attribute name="method">GET</attribute> <attribute name="path">/shop/adjustments/{id}</attribute> <attribute name="controller">ApiPlatform\Core\Action\NotFoundAction</attribute> <attribute name="read">false</attribute> <attribute name="output">false</attribute> </itemOperation> ...

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

sylius/sylius

composer
Затронутые версииВерсия исправления

< 1.12.19

1.12.19

Наименование

sylius/sylius

composer
Затронутые версииВерсия исправления

>= 1.13.0-alpha.1, < 1.13.4

1.13.4

EPSS

Процентиль: 47%
0.00239
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-200
CWE-639

Связанные уязвимости

CVSS3: 5.3
nvd
больше 1 года назад

Sylius is an Open Source eCommerce Framework on Symfony. A security vulnerability was discovered in the `/api/v2/shop/adjustments/{id}` endpoint, which retrieves order adjustments based on incremental integer IDs. The vulnerability allows an attacker to enumerate valid adjustment IDs and retrieve order tokens. Using these tokens, an attacker can access guest customer order details - sensitive guest customer information. The issue is fixed in versions: 1.12.19, 1.13.4 and above. The `/api/v2/shop/adjustments/{id}` will always return `404` status. Users are advised to upgrade. Users unable to upgrade may alter their config to mitigate this issue. Please see the linked GHSA for details.

EPSS

Процентиль: 47%
0.00239
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-200
CWE-639