CVE-2023-2017
CVSS V2 None
CVSS V3 None
Description
Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.
Overview
- CVE ID
- CVE-2023-2017
- Assigner
- info@starlabs.sg
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-17T11:15:42
- Last Modified Date
- 2023-04-28T14:27:32
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* | 1 | OR | 6.1.0 | 6.4.20.0 |
cpe:2.3:a:shopware:shopware:6.5.0.0:rc1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:shopware:shopware:6.5.0.0:rc2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:shopware:shopware:6.5.0.0:rc3:*:*:*:*:*:* | 1 | OR |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-2017 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2017 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 12:00:46 | Added to TrackCVE | |||
2023-04-17 12:00:47 | Weakness Enumeration | new | ||
2023-04-17 14:02:11 | 2023-04-17T13:12:43 | CVE Modified Date | updated | |
2023-04-17 14:02:11 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-04-19 08:00:42 | 2023-04-19T07:15:38 | CVE Modified Date | updated | |
2023-04-19 08:00:43 | References | updated | ||
2023-04-21 13:00:42 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-04-28 15:00:47 | 2023-04-28T14:27:32 | CVE Modified Date | updated | |
2023-04-28 15:00:47 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-04-28 15:00:59 | Weakness Enumeration | update | ||
2023-04-28 15:01:02 | CPE Information | updated |