{"vulnerability": "CVE-2024-42354", "sightings": [{"uuid": "efde60f8-76eb-4b3c-a62b-7d456fb5ce0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42354", "type": "seen", "source": "https://t.me/cvedetector/2795", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42354 - Shopware Unvalidated ManyToMany Association Deserialization\", \n  \"Content\": \"CVE ID : CVE-2024-42354 \nPublished : Aug. 8, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : Shopware is an open commerce platform. The store-API works with regular entities and not expose all fields for the public API; fields need to be marked as ApiAware in the EntityDefinition. So only ApiAware fields of the EntityDefinition will be encoded to the final JSON. Prior to versions 6.6.5.1 and 6.5.8.13, the processing of the Criteria did not considered ManyToMany associations and so they were not considered properly and the protections didn't get used. This issue cannot be reproduced with the default entities by Shopware, but can be triggered with extensions. Update to Shopware 6.6.5.1 or 6.5.8.13 to receive a patch. For older versions of 6.2, 6.3,  and 6.4, corresponding security measures are also available via a plugin. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T18:04:32.000000Z"}]}