Shopware is an open headless commerce platform. The implemented Flow Builder functionality in the Shopware application does not adequately validate the URL used when creating the “call webhook” action. This enables malicious users to perform web requests to internal hosts. This issue has been fixed in the Commercial Plugin release 6.5.7.4 or with the Security Plugin. For installations with Shopware 6.4 the Security plugin is recommended to be installed and up to date. For older versions of 6.4 and 6.5 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
References
Link | Resource |
---|---|
https://github.com/shopware/shopware/security/advisories/GHSA-3535-m8vh-vrmw | Vendor Advisory |
Configurations
History
24 Jan 2024, 16:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* | |
References | () https://github.com/shopware/shopware/security/advisories/GHSA-3535-m8vh-vrmw - Vendor Advisory | |
First Time |
Shopware
Shopware shopware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
17 Jan 2024, 00:03
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-16 23:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-22408
Mitre link : CVE-2024-22408
CVE.ORG link : CVE-2024-22408
JSON object : View
Products Affected
shopware
- shopware
CWE
CWE-918
Server-Side Request Forgery (SSRF)