Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xYzQzLXBnd3EtM3Eycc4AAu16
Shopware access control list bypassed via crafted specific URLs
Impact
If backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do.
Patches
We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-15
For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022
Permalink: https://github.com/advisories/GHSA-qc43-pgwq-3q2qJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xYzQzLXBnd3EtM3Eycc4AAu16
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: 10 months ago
CVSS Score: 6.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Identifiers: GHSA-qc43-pgwq-3q2q, CVE-2022-36102
References:
- https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q
- https://nvd.nist.gov/vuln/detail/CVE-2022-36102
- https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6
- https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022
- https://packagist.org/packages/shopware/shopware
- https://github.com/advisories/GHSA-qc43-pgwq-3q2q
Affected Packages
packagist:shopware/shopware
Versions: <= 5.7.14Fixed in: 5.7.15