Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Advisories: GSA_kwCzR0hTQS05M2N3LWY1amoteDg1d84AAxBk
Shopware vulnerable to Improper Control of Generation of Code in Twig rendered views
Impact
In Twig environment without the Sandbox extension, it is possible to refer to PHP functions in twig filters like map
, filter
, sort
. This allows in the template to call any global PHP function.
Patches
The problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished.
Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
References
Permalink: https://github.com/advisories/GHSA-93cw-f5jj-x85wSource: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 18 days ago
Updated: 11 days ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-93cw-f5jj-x85w, CVE-2023-22731
References:
- https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w
- https://github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1
- https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
- https://nvd.nist.gov/vuln/detail/CVE-2023-22731
- https://github.com/advisories/GHSA-93cw-f5jj-x85w
Affected Packages
packagist:shopware/core
Versions: <= 6.4.18.0Fixed in: 6.4.18.1
packagist:shopware/platform
Versions: <= 6.4.18.0Fixed in: 6.4.18.1