René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

152 lines
4.9 KiB
JSON

{
"id": "CVE-2022-24892",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-04-28T15:15:10.027",
"lastModified": "2022-05-10T16:08:29.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Shopware is an open source e-commerce software platform. Starting with version 5.0.4 and before version 5.7.9, multiple tokens for password reset can be requested. All tokens can be used to change the password. This makes it possible for an attacker to take over the victim's account if they somehow gain access to the victims email account and find an unused password reset token in the emails. This issue is fixed in version 5.7.9."
},
{
"lang": "es",
"value": "Shopware es una plataforma de software de comercio electr\u00f3nico de c\u00f3digo abierto. A partir de la versi\u00f3n 5.0.4 y versiones anteriores a 5.7.9, pueden solicitarse m\u00faltiples tokens para el restablecimiento de la contrase\u00f1a. Todos los tokens pueden ser usados para cambiar la contrase\u00f1a. Esto hace posible a un atacante apoderarse de la cuenta de la v\u00edctima si de alguna manera consigue acceso a la cuenta de correo electr\u00f3nico de la v\u00edctima y encuentra un token de restablecimiento de contrase\u00f1a no usado en los correos electr\u00f3nicos. Este problema ha sido corregido en versi\u00f3n 5.7.9"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.4",
"versionEndExcluding": "5.7.9",
"matchCriteriaId": "65DAD0C8-CE5B-457B-9A27-9318C33210DE"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://www.shopware.com/en/changelog-sw5/#5-7-9",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}