5 critical vulnerabilities in Shopware, an open source e-commerce CMS. Patch quickly

Cybersecurity specialists report the detection of five vulnerabilities in Shopware, an e-commerce platform that allows users a high level of customization. According to the report, successful exploitation would allow threat actors to deploy all kinds of cyberattacks.

Below are brief descriptions of the reported flaws, in addition to their respective identification keys and scores assigned according to the Common Vulnerability Scoring System (CVSS).

CVE-2021-37711: A bug in the file upload process would allow authenticated remote threat actors to send a specially crafted HTTP request and trick the application into initiating requests to arbitrary systems.

The vulnerability received a score of 5.6/10 and its successful exploitation would allow threat actors to deploy server-side request forgery (SSRF) attacks.

CVE-2021-37710: Insufficient disinfection of user input within SVG media files would allow remote threat actors to trick the victim into executing HTML code and arbitrary script in the user’s browser.

This flaw received a CVSS score of 5.3/10 and allows hackers to perform cross-site scripting (XSS) attacks.

CVE-2021-37709: An insecure direct object reference in the Import/Export function log files allows remote threat actors to access sensitive information on the system.

The flaw received a CVSS score of 4.6/10 and its exploitation would allow the total compromise of the system.

CVE-2021-37708: Incorrect input validation in email agent configuration allows threat actors to pass specially crafted data to the application and execute arbitrary commands on the affected system.

This is a highly severe vulnerability and received a CVSS score of 8.5/10.

CVE-2021-37707: Insufficient validation of user input would allow remote malicious hackers to manipulate product reviews through the affected API.

That flaw received a CVSS score of 4.6/10.

According to the report, all flaws found reside in the following versions of Shopware: 1.0.2, 1.0.8, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.6 RC2, 4.0.7, 4.0.8, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.2.0, 4.2.0 rc1, 4.2.1, 4.2.1.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 5.0.0, 5.0.0 -, 5.0.0 RC1, 5.0.0 RC2, 5.0.0 RC3, 5.0.0-WORKSHOP, 5.0.1, 5.0.2, 5.0.2 RC1, 5.0.3, 5.0.3 RC1, 5.0.4, 5.0.4 RC1, 5.1.0, 5.1.0 RC2, 5.1.0 RC3, 5.1.1, 5.1.2, 5.1.2 RC1, 5.1.2 RC2, 5.1.3, 5.1.3 RC1, 5.1.4, 5.1.5, 5.1.6, 5.2.0, 5.2.0 -, 5.2.0 RC1, 5.2.0 RC2, 5.2.0 RC3, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8, 5.2.9, 5.2.10, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.15, 5.2.16, 5.2.17, 5.2.18, 5.2.19, 5.2.20, 5.2.21, 5.2.22, 5.2.23, 5.2.24, 5.2.25, 5.2.26, 5.2.27, 5.3.0, 5.3.0 RC1, 5.3.0 RC2, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, 5.3.6, 5.3.7, 5.4.0, 5.4.0 RC1, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.5.0, 5.5.0 -, 5.5.0 RC1, 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.5, 5.5.6, 5.5.7, 5.5.8, 5.5.9, 5.5.10, 5.6.0, 5.6.0 RC1, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.7.0, 5.7.1, 5.7.2, 6.0.0, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.3.0.0, 6.3.0.1, 6.3.0.2, 6.3.1.0, 6.3.1.1, 6.3.2.0, 6.3.2.1, 6.3.3.0, 6.3.3.1, 6.3.4.0, 6.3.4.1, 6.3.5.0, 6.3.5.1, 6.3.5.2, 6.3.5.3, 6.3.5.4, 6.4.0.0, 6.4.1.0, 6.4.1.1, 6.4.1.2, 6.4.2.0, 6.4.2.1 and 6.4.3.0.

While the vulnerability can be exploited by unauthenticated remote actors, no active exploit attempts have been detected in the wild so far. Security patches are now available, so users of affected deployments are encouraged to update as soon as possible.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.