CVE-2024-42354 – shopware/core
Package
Manager: composer
Name: shopware/core
Vulnerable Version: >=0 <6.5.8.13 || >=6.6.0.0 <6.6.5.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00203 pctl0.42622
Details
Shopware vulnerable to Improper Access Control with ManyToMany associations in store-api ### Impact The store-API works with regular entities and not expose all fields for the public API; fields need to be marked as ApiAware in the EntityDefinition. So only ApiAware fields of the EntityDefinition will be encoded to the final JSON. The processing of the Criteria did not considered ManyToMany associations and so they were not considered properly and the protections didn't get used. This issue cannot be reproduced with the default entities by Shopware, but can be triggered with extensions. ### Patches Update to Shopware 6.6.5.1 or 6.5.8.13. ### Workarounds For older versions of 6.2, 6.3, and 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
Metadata
Created: 2024-08-08T14:42:58Z
Modified: 2024-08-12T19:17:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-hhcq-ph6w-494g/GHSA-hhcq-ph6w-494g.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-hhcq-ph6w-494g
Finding: F039
Auto approve: 1