mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
68 lines
3.0 KiB
JSON
68 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2024-31447",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-04-08T16:15:08.190",
|
|
"lastModified": "2024-04-08T18:48:40.217",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Starting in version 6.3.5.0 and prior to versions 6.6.1.0 and 6.5.8.8, when a authenticated request is made to `POST /store-api/account/logout`, the cart will be cleared, but the User won't be logged out. This affects only the direct store-api usage, as the PHP Storefront listens additionally on `CustomerLogoutEvent` and invalidates the session additionally. The problem has been fixed in Shopware 6.6.1.0 and 6.5.8.8. Those who are unable to update can install the latest version of the Shopware Security Plugin as a workaround.\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Shopware 6 es una plataforma de comercio abierta basada en Symfony Framework y Vue. A partir de la versi\u00f3n 6.3.5.0 y anteriores a las versiones 6.6.1.0 y 6.5.8.8, cuando se realiza una solicitud autenticada a `POST /store-api/account/logout`, el carrito se borrar\u00e1, pero el Usuario no se va a desconectar. Esto afecta solo al uso directo de la API de la tienda, ya que PHP Storefront escucha adicionalmente en `CustomerLogoutEvent` e invalida la sesi\u00f3n adicionalmente. El problema se solucion\u00f3 en Shopware 6.6.1.0 y 6.5.8.8. Aquellos que no puedan actualizar pueden instalar la \u00faltima versi\u00f3n del complemento de seguridad de Shopware como workaround."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-613"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/shopware/shopware/commit/5cc84ddd817ad0c1d07f9b3c79ab346d50514a77",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/shopware/shopware/commit/d29775aa758f70d08e0c5999795c7c26d230e7d3",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-5297-wrrp-rcj7",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |