Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qc43-pgwq-3q2q

Опубликовано: 16 сент. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

Shopware access control list bypassed via crafted specific URLs

Impact

If backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do.

Patches

We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-15

For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html

References

https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022

Пакеты

Наименование

shopware/shopware

composer
Затронутые версииВерсия исправления

<= 5.7.14

5.7.15

EPSS

Процентиль: 69%
0.00612
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-281

Связанные уязвимости

CVSS3: 6.3
nvd
больше 3 лет назад

Shopware is an open source e-commerce software. In affected versions if backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. Users are advised to update to the current version (5.7.15). Users can get the update via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.

EPSS

Процентиль: 69%
0.00612
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-281