Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c2f9-4jmm-v45m

Опубликовано: 06 мар. 2024
Источник: github
Github: Прошло ревью

Описание

Shopware's session is persistent in Cache for 404 pages

Impact

The Symfony Session Handler, pop's the Session Cookie and assign it to the Response. Since Shopware 6.5.8.0 the 404 pages, are cached, to improve the performance of 404 pages. So the cached Response, contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done. When Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used.

Patches

Update to Shopware version 6.5.8.7

Workarounds

Using Redis for Sessions, as this does not trigger the exploit code. Example configuration for Redis

# php.ini session.save_handler = redis session.save_path = "tcp://127.0.0.1:6379"

Consequences

As an guest browser session has been cached on a 404 page, every missing image or directly reaching a 404 page will logout the customer or clear his cart.

Пакеты

Наименование

shopware/storefront

composer
Затронутые версииВерсия исправления

>= 6.5.8.0, < 6.5.8.7

6.5.8.7

Наименование

shopware/platform

composer
Затронутые версииВерсия исправления

>= 6.5.8.0, < 6.5.8.7

6.5.8.7

EPSS

Процентиль: 31%
0.00116
Низкий

Дефекты

CWE-524

Связанные уязвимости

CVSS3: 7.5
nvd
почти 2 года назад

Shopware is an open commerce platform based on Symfony Framework and Vue. The Symfony Session Handler pops the Session Cookie and assigns it to the Response. Since Shopware 6.5.8.0, the 404 pages are cached to improve the performance of 404 pages. So the cached Response which contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done. When Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used. Shopware version 6.5.8.7 contains a patch for this issue. As a workaround, use Redis for Sessions, as this does not trigger the exploit code.

EPSS

Процентиль: 31%
0.00116
Низкий

Дефекты

CWE-524