{"uuid": "f88b9c62-7135-466f-bfbc-b46dc9fa53aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2017", "type": "seen", "source": "https://t.me/cibsecurity/62268", "content": "\u203c CVE-2023-2017 \u203c\n\nServer-side Template Injection (SSTI) in Shopware 6 (&lt;= v6.4.20.0, v6.5.0.0-rc1 &lt;= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\\Core\\Framework\\Adapter\\Twig\\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-17T14:29:22.000000Z"}