Skip to content

Server-Side Request Forgery (SSRF) in Shopware

High severity GitHub Reviewed Published Apr 20, 2022 in shopware/shopware • Updated Jan 27, 2023

Package

composer shopware/core (Composer)

Affected versions

<= 6.4.9.0

Patched versions

6.4.10.1
composer shopware/platform (Composer)
<= 6.4.9.0
6.4.10.1

Description

Impact

The attacker can abuse the Admin SDK functionality on the server to read or update internal resources.

Patches

We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview.

https://www.shopware.com/en/download/#shopware-6

Workarounds

For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

References

@shyim shyim published to shopware/shopware Apr 20, 2022
Published by the National Vulnerability Database Apr 20, 2022
Published to the GitHub Advisory Database Apr 22, 2022
Reviewed Apr 22, 2022
Last updated Jan 27, 2023

Severity

High
7.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2022-24871

GHSA ID

GHSA-7gm7-8q8v-9gf2

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.