Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Advisories: GSA_kwCzR0hTQS05M2N3LWY1amoteDg1d84AAxBk

Shopware vulnerable to Improper Control of Generation of Code in Twig rendered views

Impact

In Twig environment without the Sandbox extension, it is possible to refer to PHP functions in twig filters like map, filter, sort. This allows in the template to call any global PHP function.

Patches

The problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished.

Workarounds

For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

References

https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates

Permalink: https://github.com/advisories/GHSA-93cw-f5jj-x85w

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 18 days ago
Updated: 11 days ago

CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-93cw-f5jj-x85w, CVE-2023-22731
References:

Affected Packages

packagist:shopware/core
Versions: <= 6.4.18.0
Fixed in: 6.4.18.1
packagist:shopware/platform
Versions: <= 6.4.18.0
Fixed in: 6.4.18.1