logo

CVE-2021-32717 shopware/platform

Package

Manager: composer
Name: shopware/platform
Vulnerable Version: >=0 <6.4.1.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00409 pctl0.60476

Details

Exposure of Sensitive Information to an Unauthorized Actor Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.

Metadata

Created: 2021-09-08T18:00:47Z
Modified: 2021-06-25T15:26:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-6gr8-c3m5-mvrg/GHSA-6gr8-c3m5-mvrg.json
CWE IDs: ["CWE-200", "CWE-732"]
Alternative ID: GHSA-6gr8-c3m5-mvrg
Finding: F038
Auto approve: 1