Vulnerability Description
Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shopware | Shopware | >= 6.1.0, <= 6.4.20.0 |
Related Weaknesses (CWE)
References
- https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2Vendor Advisory
- https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8fVendor Advisory
- https://starlabs.sg/advisories/23/23-2017/ExploitMitigationThird Party Advisory
- https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2Vendor Advisory
- https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8fVendor Advisory
- https://starlabs.sg/advisories/23/23-2017/ExploitMitigationThird Party Advisory
FAQ
What is CVE-2023-2017?
CVE-2023-2017 is a vulnerability with a CVSS score of 8.8 (HIGH). Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with a...
How severe is CVE-2023-2017?
CVE-2023-2017 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2017?
Check the references section above for vendor advisories and patch information. Affected products include: Shopware Shopware.