Description
### Impact
The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process.
### Patches
The problem has been fixed with 6.4.18.1
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Or disable the newsletter registration completely.
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
Affected Software
Related
{"id": "OSV:GHSA-46H7-VJ7X-FXG2", "vendorId": null, "type": "osv", "bulletinFamily": "software", "title": "Shopware has Improper Input Validation issue in newsletter subscription", "description": "### Impact\n\nThe newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process.\n\n### Patches\nThe problem has been fixed with 6.4.18.1\n\n### Workarounds\nFor older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Or disable the newsletter registration completely.\n\n### References\n\nhttps://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates\n\n", "published": "2023-01-20T23:18:41", "modified": "2023-04-11T01:21:17", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "href": "https://osv.dev/vulnerability/GHSA-46h7-vj7x-fxg2", "reporter": "Google", "references": ["https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2", "https://nvd.nist.gov/vuln/detail/CVE-2023-22734", "https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620", "https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates", "https://github.com/shopware/platform"], "cvelist": ["CVE-2023-22734"], "immutableFields": [], "lastseen": "2023-04-11T01:21:20", "viewCount": 12, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2023-22734"]}, {"type": "github", "idList": ["GHSA-46H7-VJ7X-FXG2"]}, {"type": "veracode", "idList": ["VERACODE:38957"]}]}, "score": {"value": 1.1, "vector": "NONE"}, "affected_software": {"major_version": [{"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}, {"name": "shopware/core", "version": 6}]}, "epss": [{"cve": "CVE-2023-22734", "epss": 0.00052, "percentile": 0.18265, "modified": "2023-04-10"}], "vulnersScore": 1.1}, "_state": {"dependencies": 1681176188, "score": 1684017724, "affected_software_major_version": 0, "epss": 1681176397}, "_internal": {"score_hash": "eeb905df01e79fc50f68f3f5722d9e7e"}, "affectedSoftware": [{"version": "6.3.0.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.0.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.0.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.1.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.1.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.2.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.2.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.3.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.3.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.4.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.4.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.5.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.5.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.5.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.5.3", "operator": "eq", "name": "shopware/core"}, {"version": "6.3.5.4", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.0.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.0.0-RC1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.1.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.1.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.1.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.10.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.10.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.11.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.11.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.12.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.13.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.14.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.15.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.15.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.15.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.16.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.16.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.17.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.17.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.17.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.18.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.2.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.2.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.3.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.3.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.4.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.4.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.5.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.5.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.6.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.6.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.7.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.8.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.8.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.8.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.4.9.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.0.0+ea2", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.0-rc1", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.0-rc2", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.0-rc3", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.0-rc4", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.3", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.4", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.5", "operator": "eq", "name": "shopware/core"}, {"version": "6.1.6", "operator": "eq", "name": "shopware/core"}, {"version": "6.2.0", "operator": "eq", "name": "shopware/core"}, {"version": "6.2.0-RC1", "operator": "eq", "name": "shopware/core"}, {"version": "6.2.1", "operator": "eq", "name": "shopware/core"}, {"version": "6.2.2", "operator": "eq", "name": "shopware/core"}, {"version": "6.2.3", "operator": "eq", "name": "shopware/core"}]}
{"cve": [{"lastseen": "2023-06-04T17:41:50", "description": "Shopware is an open source commerce platform based on Symfony Framework and Vue js. The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process. As a result operators may have inconsistencies in their newsletter systems. This problem has been fixed with version 6.4.18.1. Users are advised to upgrade. Users unable to upgrade may find security measures are available via a plugin for major versions 6.1, 6.2, and 6.3. Users may also disable newsletter registration completely.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-01-17T22:15:00", "type": "cve", "title": "CVE-2023-22734", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-22734"], "modified": "2023-01-25T17:26:00", "cpe": [], "id": "CVE-2023-22734", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22734", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "github": [{"lastseen": "2023-06-04T20:12:37", "description": "### Impact\n\nThe newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process.\n\n### Patches\nThe problem has been fixed with 6.4.18.1\n\n### Workarounds\nFor older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Or disable the newsletter registration completely.\n\n### References\n\nhttps://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-01-20T23:18:41", "type": "github", "title": "Shopware has Improper Input Validation issue in newsletter subscription", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-22734"], "modified": "2023-01-20T23:19:38", "id": "GHSA-46H7-VJ7X-FXG2", "href": "https://github.com/advisories/GHSA-46h7-vj7x-fxg2", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "veracode": [{"lastseen": "2023-06-04T19:59:49", "description": "Shopware is vulnerable to Improper Validation. The vulnerability exists because the library does not properly validate the double opt-in setting in the newsletter route, allowing an attacker to skip the complete double opt-in process.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-01-22T13:30:13", "type": "veracode", "title": "Improper Validation", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-22734"], "modified": "2023-01-25T19:38:51", "id": "VERACODE:38957", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-38957/summary", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}]}