Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xOTdjLTJtaDMtcGd3Oc4AA0IK
Shopware dependency configuration exposed
Impact
Due to a wrong configuration in the .htaccess
file, the configuration file of Javascript dependencies could be read in production environments (themes/package-lock.json
). With this information, the used Shopware version might be determined by an attacker, which could be used for further attacks.
Patches
We recommend updating to the current version 5.7.18. You can get the update to 5.7.18 regularly via the Auto-Updater or directly via the release page.
https://github.com/shopware5/shopware/releases/tag/v5.7.18
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023
Permalink: https://github.com/advisories/GHSA-q97c-2mh3-pgw9JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xOTdjLTJtaDMtcGd3Oc4AA0IK
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-q97c-2mh3-pgw9, CVE-2023-34098
References:
- https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9
- https://github.com/shopware5/shopware/security/advisories/GHSA-q97c-2mh3-pgw9
- https://nvd.nist.gov/vuln/detail/CVE-2023-34098
- https://github.com/shopware5/shopware/commit/b3518c8d9562a38615d638f31f79829f6e2f4b6a
- https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023
- https://www.shopware.com/en/changelog-sw5/#5-7-18
- https://github.com/advisories/GHSA-q97c-2mh3-pgw9
Blast Radius: 8.8
Affected Packages
packagist:shopware/shopware
Dependent packages: 38Dependent repositories: 45
Downloads: 686,707 total
Affected Version Ranges: >= 5.6.0, <= 5.7.17
Fixed in: 5.7.18
All affected versions: 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.9, 5.7.10, 5.7.11, 5.7.12, 5.7.13, 5.7.14, 5.7.15, 5.7.16, 5.7.17
All unaffected versions: 1.0.2, 1.0.8, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8, 5.2.9, 5.2.10, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.15, 5.2.16, 5.2.17, 5.2.18, 5.2.19, 5.2.20, 5.2.21, 5.2.22, 5.2.23, 5.2.24, 5.2.25, 5.2.26, 5.2.27, 5.3.0, 5.3.4, 5.3.5, 5.3.6, 5.3.7, 5.4.0, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.5.0, 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.5, 5.5.6, 5.5.7, 5.5.8, 5.5.9, 5.5.10, 5.7.18, 5.7.19