CVE-2024-27917 – Shopware's session is persistent in Cache for 404 pages
https://notcve.org/view.php?id=CVE-2024-27917
Shopware is an open commerce platform based on Symfony Framework and Vue. The Symfony Session Handler pops the Session Cookie and assigns it to the Response. Since Shopware 6.5.8.0, the 404 pages are cached to improve the performance of 404 pages. So the cached Response which contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done. • https://github.com/shopware/shopware/commit/7d9cb03225efca5f97e69b800d8747598dd15ce3 https://github.com/shopware/shopware/releases/tag/v6.5.8.7 https://github.com/shopware/shopware/security/advisories/GHSA-c2f9-4jmm-v45m https://github.com/shopware/storefront/commit/3477e4a425d3c54b4bfae82d703fe3838dc21d3e • CWE-524: Use of Cache Containing Sensitive Information •
CVE-2024-22406 – Blind SQL-injection in DAL aggregations in Shopware
https://notcve.org/view.php?id=CVE-2024-22406
Shopware is an open headless commerce platform. The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using time-based SQL-queries. This issue has been addressed and users are advised to update to Shopware 6.5.7.4. • https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-22407 – Broken Access Control order API in Shopware
https://notcve.org/view.php?id=CVE-2024-22407
Shopware is an open headless commerce platform. In the Shopware CMS, the state handler for orders fails to sufficiently verify user authorizations for actions that modify the payment, delivery, and/or order status. Due to this inadequate implementation, users lacking 'write' permissions for orders are still able to change the order state. This issue has been addressed and users are advised to update to Shopware 6.5.7.4. For older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. • https://github.com/shopware/shopware/security/advisories/GHSA-3867-jc5c-66qf • CWE-284: Improper Access Control •
CVE-2024-22408 – Server-Side Request Forgery (SSRF) in Shopware Flow Builder
https://notcve.org/view.php?id=CVE-2024-22408
Shopware is an open headless commerce platform. The implemented Flow Builder functionality in the Shopware application does not adequately validate the URL used when creating the “call webhook” action. This enables malicious users to perform web requests to internal hosts. This issue has been fixed in the Commercial Plugin release 6.5.7.4 or with the Security Plugin. For installations with Shopware 6.4 the Security plugin is recommended to be installed and up to date. • https://github.com/shopware/shopware/security/advisories/GHSA-3535-m8vh-vrmw • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2023-34099 – Improper mail validation in Shopware
https://notcve.org/view.php?id=CVE-2023-34099
Shopware is an open source e-commerce software. The mail validation in the registration process had some flaws, so it was possible to construct different mail addresses, that in the end result in the same address, which is shared by multiple accounts. This issue has been addressed in version 5.7.18 and users are advised to update. There are no known workarounds for this vulnerability. • https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023 https://github.com/shopware/shopware/security/advisories/GHSA-gh66-fp7j-98v5 https://github.com/shopware5/shopware/commit/39cc714d9a0be33b43877044d0b88ea3c6b43f3d https://www.shopware.com/en/changelog-sw5/#5-7-18 • CWE-754: Improper Check for Unusual or Exceptional Conditions •