April 17, 2023, 11:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.

access array attackers bypass call code cve environment extension framework function github github repositories injection issue names php platform rc4 repositories sandbox server ssti strings template template injection upgrade validation

Associate Director Cyber Engineering

@ KBR, Inc. | CO102: 16800 E Centretech Pkwy,Aurora 16800 East Centretech Pkwy Building S75, Aurora, CO, 80011 USA

Application Security Engineering Manager - Security Operations (Boston)

@ Klaviyo | Boston, MA

Azure Security DevOps Engineer

@ Global Payments | North Carolina - Remote

Senior IT Planning Analyst - Cybersecurity PMO

@ Pacific Gas and Electric Company | Oakland, CA, US, 94612

Principal Business Value Consultant

@ Palo Alto Networks | Chicago, IL, United States

Sr. Specialist - Cyber Defence Operations

@ Diageo | Bengaluru Karle Town SEZ