ghsa-c2f9-4jmm-v45m
Vulnerability from github
Impact
The Symfony Session Handler, pop's the Session Cookie and assign it to the Response. Since Shopware 6.5.8.0 the 404 pages, are cached, to improve the performance of 404 pages. So the cached Response, contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done. When Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used.
Patches
Update to Shopware version 6.5.8.7
Workarounds
Using Redis for Sessions, as this does not trigger the exploit code. Example configuration for Redis
```ini
php.ini
session.save_handler = redis session.save_path = "tcp://127.0.0.1:6379" ```
Consequences
As an guest browser session has been cached on a 404 page, every missing image or directly reaching a 404 page will logout the customer or clear his cart.
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "shopware/storefront" }, "ranges": [ { "events": [ { "introduced": "6.5.8.0" }, { "fixed": "6.5.8.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "shopware/platform" }, "ranges": [ { "events": [ { "introduced": "6.5.8.0" }, { "fixed": "6.5.8.7" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-27917" ], "database_specific": { "cwe_ids": [ "CWE-524" ], "github_reviewed": true, "github_reviewed_at": "2024-03-06T15:06:54Z", "nvd_published_at": null, "severity": "CRITICAL" }, "details": "### Impact\n\nThe Symfony Session Handler, pop\u0027s the Session Cookie and assign it to the Response. Since Shopware 6.5.8.0 the 404 pages, are cached, to improve the performance of 404 pages. So the cached Response, contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done.\nWhen Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used.\n\n### Patches\nUpdate to Shopware version 6.5.8.7\n\n### Workarounds\nUsing Redis for Sessions, as this does not trigger the exploit code. Example configuration for Redis\n\n```ini\n# php.ini\nsession.save_handler = redis\nsession.save_path = \"tcp://127.0.0.1:6379\"\n```\n\n## Consequences\n\nAs an guest browser session has been cached on a 404 page, every missing image or directly reaching a 404 page will logout the customer or clear his cart.\n", "id": "GHSA-c2f9-4jmm-v45m", "modified": "2024-03-06T15:06:54Z", "published": "2024-03-06T15:06:54Z", "references": [ { "type": "WEB", "url": "https://github.com/shopware/shopware/security/advisories/GHSA-c2f9-4jmm-v45m" }, { "type": "WEB", "url": "https://github.com/shopware/shopware/commit/7d9cb03225efca5f97e69b800d8747598dd15ce3" }, { "type": "WEB", "url": "https://github.com/shopware/storefront/commit/3477e4a425d3c54b4bfae82d703fe3838dc21d3e" }, { "type": "PACKAGE", "url": "https://github.com/shopware/shopware" }, { "type": "WEB", "url": "https://github.com/shopware/shopware/releases/tag/v6.5.8.7" } ], "schema_version": "1.4.0", "severity": [], "summary": "Shopware\u0027s session is persistent in Cache for 404 pages" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.