CVE-2021-32717 – shopware/platform
Package
Manager: composer
Name: shopware/platform
Vulnerable Version: >=0 <6.4.1.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00409 pctl0.60476
Details
Exposure of Sensitive Information to an Unauthorized Actor Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
Metadata
Created: 2021-09-08T18:00:47Z
Modified: 2021-06-25T15:26:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-6gr8-c3m5-mvrg/GHSA-6gr8-c3m5-mvrg.json
CWE IDs: ["CWE-200", "CWE-732"]
Alternative ID: GHSA-6gr8-c3m5-mvrg
Finding: F038
Auto approve: 1