Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-q97c-2mh3-pgw9: Shopware dependency configuration exposed

Impact

Due to a wrong configuration in the .htaccess file, the configuration file of Javascript dependencies could be read in production environments (themes/package-lock.json). With this information, the used Shopware version might be determined by an attacker, which could be used for further attacks.

Patches

We recommend updating to the current version 5.7.18. You can get the update to 5.7.18 regularly via the Auto-Updater or directly via the release page. https://github.com/shopware5/shopware/releases/tag/v5.7.18

For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html

References

https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023

ghsa
#js#git#java

Package

composer shopware/shopware (Composer)

Affected versions

>= 5.6.0, <= 5.7.17

Patched versions

5.7.18

Description

Impact

Due to a wrong configuration in the .htaccess file, the configuration file of Javascript dependencies could be read in production environments (themes/package-lock.json). With this information, the used Shopware version might be determined by an attacker, which could be used for further attacks.

Patches

We recommend updating to the current version 5.7.18. You can get the update to 5.7.18 regularly via the Auto-Updater or directly via the release page.
https://github.com/shopware5/shopware/releases/tag/v5.7.18

For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html

References

https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023

References

  • GHSA-q97c-2mh3-pgw9
  • GHSA-q97c-2mh3-pgw9
  • https://nvd.nist.gov/vuln/detail/CVE-2023-34098
  • shopware5/shopware@b3518c8
  • https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023
  • https://www.shopware.com/en/changelog-sw5/#5-7-18

mitelg published to shopware5/shopware

Jun 27, 2023

Published to the GitHub Advisory Database

Jun 28, 2023

Reviewed

Jun 28, 2023

Last updated

Jun 28, 2023

Related news

CVE-2023-34098: SW-27070 - improve htaccess · shopware5/shopware@b3518c8

Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.

CVE-2023-34099: Shopware 5 - Security Updates

Shopware is an open source e-commerce software. The mail validation in the registration process had some flaws, so it was possible to construct different mail addresses, that in the end result in the same address, which is shared by multiple accounts. This issue has been addressed in version 5.7.18 and users are advised to update. There are no known workarounds for this vulnerability.