logo

CVE-2022-24871 shopware/platform

Package

Manager: composer
Name: shopware/platform
Vulnerable Version: >=0 <6.4.10.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0033 pctl0.55311

Details

Server-Side Request Forgery (SSRF) in Shopware ### Impact The attacker can abuse the Admin SDK functionality on the server to read or update internal resources. ### Patches We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

Metadata

Created: 2022-04-22T21:04:07Z
Modified: 2022-04-22T21:04:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-7gm7-8q8v-9gf2/GHSA-7gm7-8q8v-9gf2.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-7gm7-8q8v-9gf2
Finding: F100
Auto approve: 1