CVE-2023-2017 – shopware/core
Package
Manager: composer
Name: shopware/core
Vulnerable Version: >=0 <6.4.20.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01355 pctl0.79392
Details
Improper Control of Generation of Code in Twig rendered views ### Impact We fixed with [CVE-2023-22731](https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w) Twig filters to only be executed with allowed functions. It is possible to pass PHP Closures as string or an array and array crafted PHP Closures was not checked against allow list ### Patches The problem has been fixed with 6.4.20.1 with an improved override. ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023?category=security-updates
Metadata
Created: 2023-04-18T13:14:20Z
Modified: 2023-04-18T13:14:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-7v2v-9rm4-7m8f/GHSA-7v2v-9rm4-7m8f.json
CWE IDs: ["CWE-1336", "CWE-94"]
Alternative ID: GHSA-7v2v-9rm4-7m8f
Finding: F422
Auto approve: 1