cvelist/2024/22xxx/CVE-2024-22406.json

86 lines
3.3 KiB
JSON
Raw Normal View History

2024-01-10 16:00:36 +00:00
{
2024-01-16 23:00:37 +00:00
"data_version": "4.0",
2024-01-10 16:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-22406",
2024-01-16 23:00:37 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2024-01-10 16:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-16 23:00:37 +00:00
"value": "Shopware is an open headless commerce platform. The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the \u201caggregations\u201d object. The \u2018name\u2019 field in this \u201caggregations\u201d object is vulnerable SQL-injection and can be exploited using time-based SQL-queries. This issue has been addressed and users are advised to update to Shopware 6.5.7.4. For older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "shopware",
"product": {
"product_data": [
{
"product_name": "shopware",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "< 6.5.7.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9",
"refsource": "MISC",
"name": "https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9"
}
]
},
"source": {
"advisory": "GHSA-qmp9-2xwj-m6m9",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
2024-01-10 16:00:36 +00:00
}
]
}
}