// For flags

CVE-2024-22408

Server-Side Request Forgery (SSRF) in Shopware Flow Builder

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Shopware is an open headless commerce platform. The implemented Flow Builder functionality in the Shopware application does not adequately validate the URL used when creating the “call webhook” action. This enables malicious users to perform web requests to internal hosts. This issue has been fixed in the Commercial Plugin release 6.5.7.4 or with the Security Plugin. For installations with Shopware 6.4 the Security plugin is recommended to be installed and up to date. For older versions of 6.4 and 6.5 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

Shopware es una plataforma de comercio abierta y sin cabeza. La funcionalidad Flow Builder implementada en la aplicación Shopware no valida adecuadamente la URL utilizada al crear la acción "call webhook". Esto permite a usuarios malintencionados realizar solicitudes web a hosts internos. Este problema se solucionó en la versión 6.5.7.4 del complemento comercial o con el complemento de seguridad. Para instalaciones con Shopware 6.4, se recomienda instalar y actualizar el complemento de seguridad. Para versiones anteriores de 6.4 y 6.5, las medidas de seguridad correspondientes también están disponibles a través de un complemento. Para obtener la gama completa de funciones, recomendamos actualizar a la última versión de Shopware.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2024-01-10 CVE Reserved
  • 2024-01-16 CVE Published
  • 2024-01-25 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Shopware
Search vendor "Shopware"
Shopware
Search vendor "Shopware" for product "Shopware"
< 6.5.7.4
Search vendor "Shopware" for product "Shopware" and version " < 6.5.7.4"
-
Affected