Shopware is an open headless commerce platform. The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using time-based SQL-queries. This issue has been addressed and users are advised to update to Shopware 6.5.7.4. For older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
References
Link | Resource |
---|---|
https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9 | Vendor Advisory |
Configurations
History
24 Jan 2024, 17:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Shopware
Shopware shopware |
|
References | () https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9 - Vendor Advisory | |
CPE | cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
17 Jan 2024, 00:03
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-16 23:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-22406
Mitre link : CVE-2024-22406
CVE.ORG link : CVE-2024-22406
JSON object : View
Products Affected
shopware
- shopware
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')