33 results (0.008 seconds)

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

Shopware is an open commerce platform. Prior to versions 6.6.5.1 and 6.5.8.13, the `context` variable is injected into almost any Twig Template and allows to access to current language, currency information. The context object allows also to switch for a short time the scope of the Context as a helper with a callable function. The function can be called also from Twig and as the second parameter allows any callable, it's possible to call from Twig any statically callable PHP function/method. It's not possible as customer to provide any Twig code, the attacker would require access to Administration to exploit it using Mail templates or using App Scripts. • https://github.com/shopware/core/commit/04183e0c02af3b404eb7d52c683734bfe0595038 https://github.com/shopware/core/commit/a784aa1cec0624e36e0ee4d41aeebaed40e0442f https://github.com/shopware/shopware/commit/8504ba7e56e53add6a1d5b9d45015e3d899cd0ac https://github.com/shopware/shopware/commit/e43423bcc93c618c3036f94c12aa29514da8cf2e https://github.com/shopware/shopware/security/advisories/GHSA-35jp-8cgg-p4wj • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

Shopware, an open ecommerce platform, has a new Twig Tag `sw_silent_feature_call` which silences deprecation messages while triggered in this tag. Prior to versions 6.6.5.1 and 6.5.8.13, it accepts as parameter a string the feature flag name to silence, but this parameter is not escaped properly and allows execution of code. Update to Shopware 6.6.5.1 or 6.5.8.13 to receive a patch. For older versions of 6.2, 6.3, and 6.4, corresponding security measures are also available via a plugin. • https://github.com/shopware/core/commit/a784aa1cec0624e36e0ee4d41aeebaed40e0442f https://github.com/shopware/core/commit/d35ee2eda5c995faeb08b3dad127eab65c64e2a2 https://github.com/shopware/shopware/commit/445c6763cc093fbd651e0efaa4150deae4ae60da https://github.com/shopware/shopware/commit/8504ba7e56e53add6a1d5b9d45015e3d899cd0ac https://github.com/shopware/shopware/security/advisories/GHSA-27wp-jvhw-v4xp • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Shopware is an open commerce platform. The store-API works with regular entities and not expose all fields for the public API; fields need to be marked as ApiAware in the EntityDefinition. So only ApiAware fields of the EntityDefinition will be encoded to the final JSON. Prior to versions 6.6.5.1 and 6.5.8.13, the processing of the Criteria did not considered ManyToMany associations and so they were not considered properly and the protections didn't get used. This issue cannot be reproduced with the default entities by Shopware, but can be triggered with extensions. • https://github.com/shopware/core/commit/a784aa1cec0624e36e0ee4d41aeebaed40e0442f https://github.com/shopware/core/commit/d35ee2eda5c995faeb08b3dad127eab65c64e2a2 https://github.com/shopware/shopware/commit/8504ba7e56e53add6a1d5b9d45015e3d899cd0ac https://github.com/shopware/shopware/commit/ad83d38809df457efef21c37ce0996430334bf01 https://github.com/shopware/shopware/security/advisories/GHSA-hhcq-ph6w-494g • CWE-284: Improper Access Control •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Starting in version 6.3.5.0 and prior to versions 6.6.1.0 and 6.5.8.8, when a authenticated request is made to `POST /store-api/account/logout`, the cart will be cleared, but the User won't be logged out. This affects only the direct store-api usage, as the PHP Storefront listens additionally on `CustomerLogoutEvent` and invalidates the session additionally. The problem has been fixed in Shopware 6.6.1.0 and 6.5.8.8. Those who are unable to update can install the latest version of the Shopware Security Plugin as a workaround. • https://github.com/shopware/shopware/commit/5cc84ddd817ad0c1d07f9b3c79ab346d50514a77 https://github.com/shopware/shopware/commit/d29775aa758f70d08e0c5999795c7c26d230e7d3 https://github.com/shopware/shopware/security/advisories/GHSA-5297-wrrp-rcj7 • CWE-613: Insufficient Session Expiration •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Shopware is an open headless commerce platform. The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using time-based SQL-queries. This issue has been addressed and users are advised to update to Shopware 6.5.7.4. • https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •