Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-2017
PUBLISHED
More InfoOfficial Page
Assigner-STAR_Labs
Assigner Org ID-b1571b85-cbc9-431f-830b-0c8155323a69
View Known Exploited Vulnerability (KEV) details
Published At-17 Apr, 2023 | 10:18
Updated At-05 Feb, 2025 | 20:46
Rejected At-
▼CVE Numbering Authority (CNA)
Improper Control of Generation of Code in Twig Rendered Views in Shopware

Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.

Affected Products
Vendor
Shopware AG
Product
Shopware 6
Default Status
unaffected
Versions
Affected
  • From 0 through 6.4.20.0 (semver)
  • From 6.5.0.0-rc1 through 6.5.0.0-rc4 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-184CWE-184 Incomplete List of Disallowed Inputs
CWECWE-1336CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine
Type: CWE
CWE ID: CWE-184
Description: CWE-184 Incomplete List of Disallowed Inputs
Type: CWE
CWE ID: CWE-1336
Description: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-242CAPEC-242 Code Injection
CAPEC ID: CAPEC-242
Description: CAPEC-242 Code Injection
Solutions

Users are advised to upgrade to v6.4.20.1 to resolve this issue.

Configurations

Workarounds

Exploits

Credits

reporter
Ngo Wei Lin (@Creastery) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023
vendor-advisory
https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8f
vendor-advisory
https://starlabs.sg/advisories/23/23-2017/
third-party-advisory
Hyperlink: https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023
Resource:
vendor-advisory
Hyperlink: https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8f
Resource:
vendor-advisory
Hyperlink: https://starlabs.sg/advisories/23/23-2017/
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023
vendor-advisory
x_transferred
https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8f
vendor-advisory
x_transferred
https://starlabs.sg/advisories/23/23-2017/
third-party-advisory
x_transferred
Hyperlink: https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023
Resource:
vendor-advisory
x_transferred
Hyperlink: https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8f
Resource:
vendor-advisory
x_transferred
Hyperlink: https://starlabs.sg/advisories/23/23-2017/
Resource:
third-party-advisory
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found