René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

134 lines
4.3 KiB
JSON

{
"id": "CVE-2022-36102",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-09-12T20:15:12.883",
"lastModified": "2022-09-15T18:45:00.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Shopware is an open source e-commerce software. In affected versions if backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. Users are advised to update to the current version (5.7.15). Users can get the update via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue."
},
{
"lang": "es",
"value": "Shopware es un software de comercio electr\u00f3nico de c\u00f3digo abierto. En las versiones afectadas, si es llamado a los controladores de administraci\u00f3n del backend con una notaci\u00f3n determinada, la ACL podr\u00eda omitirse. Los usuarios podr\u00edan ejecutar acciones que normalmente no pueden hacer. Es recomendado a usuarios actualizar a la versi\u00f3n actual (5.7.15). Los usuarios pueden conseguir la actualizaci\u00f3n por medio del Auto-Updater o directamente por medio del resumen de descargas. No se presentan mitigaciones conocidas para este problema"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.7.15",
"matchCriteriaId": "8F0E1832-C54F-4482-879F-36B6FABDD9AD"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://packagist.org/packages/shopware/shopware",
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
]
}
]
}