Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: STAR_Labs
Published:
Updated: 2025-02-05T20:46:43.936Z
Reserved: 2023-04-13T04:21:56.530Z
Link: CVE-2023-2017

Updated: 2024-08-02T06:12:19.518Z

Status : Modified
Published: 2023-04-17T11:15:42.160
Modified: 2024-11-21T07:57:46.130
Link: CVE-2023-2017

No data.