logo

CVE-2023-22733 shopware/platform

Package

Manager: composer
Name: shopware/platform
Vulnerable Version: >=0 <6.4.18.1

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00144 pctl0.35315

Details

Shopware's log module vulnerable to Improper Output Neutralization ### Impact The log module contains all kind of sent mails. It is possible to see the password reset email of customers and admin users to gain probably more access. ### Patches Update to the latest 6.4.18.1 version. ### Workarounds - For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. - Remove from all users the log module ACL rights - [Disable logging](https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging) ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates

Metadata

Created: 2023-01-20T17:33:54Z
Modified: 2023-01-25T17:57:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-7cp7-jfp6-jh4f/GHSA-7cp7-jfp6-jh4f.json
CWE IDs: ["CWE-117", "CWE-532"]
Alternative ID: GHSA-7cp7-jfp6-jh4f
Finding: F059
Auto approve: 1