Skip to content

Server-Side Request Forgery (SSRF) in Flow Builder

High
pweyck published GHSA-3535-m8vh-vrmw Jan 16, 2024

Package

composer store.shopware.com/swagcommercial (Composer)

Affected versions

<= 5.7.3

Patched versions

5.7.4
composer store.shopware.com/swagflowbuilder (Composer)
*
None

Description

Impact

The implemented Flow Builder functionality in the Shopware application does not adequately validate the URL used when creating the “call webhook” action. This enables malicious users to perform web requests to internal hosts.

Patches

This issue has been fixed in the Commercial Plugin release 6.5.7.4 or with the Security Plugin.
For installations with Shopware 6.4 the Security plugin is recommended to be installed and up to date.

Workarounds

For older versions of 6.4 and 6.5 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

Severity

High
7.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N

CVE ID

CVE-2024-22408

Weaknesses