Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Advisories: GSA_kwCzR0hTQS03Y3A3LWpmcDYtamg0Zs4AAxFz
Shopware's log module vulnerable to Improper Output Neutralization
Impact
The log module contains all kind of sent mails. It is possible to see the password reset email of customers and admin users to gain probably more access.
Patches
Update to the latest 6.4.18.1 version.
Workarounds
- For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
- Remove from all users the log module ACL rights
- Disable logging
References
Permalink: https://github.com/advisories/GHSA-7cp7-jfp6-jh4fSource: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 9 days ago
Updated: 4 days ago
CVSS Score: 2.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-7cp7-jfp6-jh4f, CVE-2023-22733
References:
- https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f
- https://nvd.nist.gov/vuln/detail/CVE-2023-22733
- https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07
- https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging
- https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
- https://github.com/advisories/GHSA-7cp7-jfp6-jh4f
Affected Packages
packagist:shopware/core
Versions: <= 6.4.18.0Fixed in: 6.4.18.1
packagist:shopware/platform
Versions: <= 6.4.18.0Fixed in: 6.4.18.1