Vulnerability Details CVE-2023-2017
Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.3%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-2017
-
cpe:2.3:a:shopware:shopware:6.1.0
-
cpe:2.3:a:shopware:shopware:6.1.1
-
cpe:2.3:a:shopware:shopware:6.1.2
-
cpe:2.3:a:shopware:shopware:6.1.3
-
cpe:2.3:a:shopware:shopware:6.1.4
-
cpe:2.3:a:shopware:shopware:6.1.5
-
cpe:2.3:a:shopware:shopware:6.1.6
-
cpe:2.3:a:shopware:shopware:6.2.0
-
cpe:2.3:a:shopware:shopware:6.2.1
-
cpe:2.3:a:shopware:shopware:6.2.2
-
cpe:2.3:a:shopware:shopware:6.2.3
-
cpe:2.3:a:shopware:shopware:6.3.0.0
-
cpe:2.3:a:shopware:shopware:6.3.0.1
-
cpe:2.3:a:shopware:shopware:6.3.0.2
-
cpe:2.3:a:shopware:shopware:6.3.1.0
-
cpe:2.3:a:shopware:shopware:6.3.1.1
-
cpe:2.3:a:shopware:shopware:6.3.2.0
-
cpe:2.3:a:shopware:shopware:6.3.2.1
-
cpe:2.3:a:shopware:shopware:6.3.3.0
-
cpe:2.3:a:shopware:shopware:6.3.3.1
-
cpe:2.3:a:shopware:shopware:6.3.4.0
-
cpe:2.3:a:shopware:shopware:6.3.4.1
-
cpe:2.3:a:shopware:shopware:6.3.5.0
-
cpe:2.3:a:shopware:shopware:6.3.5.1
-
cpe:2.3:a:shopware:shopware:6.3.5.2
-
cpe:2.3:a:shopware:shopware:6.3.5.3
-
cpe:2.3:a:shopware:shopware:6.3.5.4
-
cpe:2.3:a:shopware:shopware:6.4.0.0
-
cpe:2.3:a:shopware:shopware:6.4.1.0
-
cpe:2.3:a:shopware:shopware:6.4.1.1
-
cpe:2.3:a:shopware:shopware:6.4.1.2
-
cpe:2.3:a:shopware:shopware:6.4.10.0
-
cpe:2.3:a:shopware:shopware:6.4.10.1
-
cpe:2.3:a:shopware:shopware:6.4.11.0
-
cpe:2.3:a:shopware:shopware:6.4.11.1
-
cpe:2.3:a:shopware:shopware:6.4.12.0
-
cpe:2.3:a:shopware:shopware:6.4.13.0
-
cpe:2.3:a:shopware:shopware:6.4.14.0
-
cpe:2.3:a:shopware:shopware:6.4.15.0
-
cpe:2.3:a:shopware:shopware:6.4.15.1
-
cpe:2.3:a:shopware:shopware:6.4.15.2
-
cpe:2.3:a:shopware:shopware:6.4.16.0
-
cpe:2.3:a:shopware:shopware:6.4.16.1
-
cpe:2.3:a:shopware:shopware:6.4.17.0
-
cpe:2.3:a:shopware:shopware:6.4.17.1
-
cpe:2.3:a:shopware:shopware:6.4.17.2
-
cpe:2.3:a:shopware:shopware:6.4.18.0
-
cpe:2.3:a:shopware:shopware:6.4.18.1
-
cpe:2.3:a:shopware:shopware:6.4.19.0
-
cpe:2.3:a:shopware:shopware:6.4.2.0
-
cpe:2.3:a:shopware:shopware:6.4.2.1
-
cpe:2.3:a:shopware:shopware:6.4.20.0
-
cpe:2.3:a:shopware:shopware:6.4.3.0
-
cpe:2.3:a:shopware:shopware:6.4.3.1
-
cpe:2.3:a:shopware:shopware:6.4.4.0
-
cpe:2.3:a:shopware:shopware:6.4.4.1
-
cpe:2.3:a:shopware:shopware:6.4.5.0
-
cpe:2.3:a:shopware:shopware:6.4.5.1
-
cpe:2.3:a:shopware:shopware:6.4.6.0
-
cpe:2.3:a:shopware:shopware:6.4.6.1
-
cpe:2.3:a:shopware:shopware:6.4.7.0
-
cpe:2.3:a:shopware:shopware:6.4.8.0
-
cpe:2.3:a:shopware:shopware:6.4.8.1
-
cpe:2.3:a:shopware:shopware:6.4.8.2
-
cpe:2.3:a:shopware:shopware:6.4.9.0
-
cpe:2.3:a:shopware:shopware:6.5.0.0