Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-31447
HistoryApr 08, 2024 - 3:39 p.m.

CVE-2024-31447 Shopware has Improper Session Handling in store-api

2024-04-0815:39:29
CWE-613
GitHub_M
www.cve.org
shopware
improper session handling
symfony framework
vue
authentication
cart
user logout
php storefront
customerlogoutevent
security plugin

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

15.7%

Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Starting in version 6.3.5.0 and prior to versions 6.6.1.0 and 6.5.8.8, when a authenticated request is made to POST /store-api/account/logout, the cart will be cleared, but the User won’t be logged out. This affects only the direct store-api usage, as the PHP Storefront listens additionally on CustomerLogoutEvent and invalidates the session additionally. The problem has been fixed in Shopware 6.6.1.0 and 6.5.8.8. Those who are unable to update can install the latest version of the Shopware Security Plugin as a workaround.

CNA Affected

[
  {
    "vendor": "shopware",
    "product": "shopware",
    "versions": [
      {
        "version": ">= 6.3.5.0, < 6.5.8.8",
        "status": "affected"
      },
      {
        "version": ">= 6.6.0.0-rc1, < 6.6.1.0",
        "status": "affected"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

15.7%

Related for CVELIST:CVE-2024-31447