Vulnerability Details : CVE-2023-22732
Shopware is an open source commerce platform based on Symfony Framework and Vue js. The Administration session expiration was set to one week, when an attacker has stolen the session cookie they could use it for a long period of time. In version 6.4.18.1 an automatic logout into the Administration session has been added. As a result the user will be logged out when they are inactive. Users are advised to upgrade. There are no known workarounds for this issue.
Products affected by CVE-2023-22732
- cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22732
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22732
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
3.7
|
LOW | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
2.2
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2023-22732
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-22732
-
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
Shopware 6 - Security Updates - Security Update 01/2023Patch;Vendor Advisory
-
https://github.com/shopware/platform/security/advisories/GHSA-59qg-93jg-236f
Insufficient Session Expiration in Administration · Advisory · shopware/platform · GitHubThird Party Advisory
-
https://github.com/shopware/platform/commit/cd7a89cbcd3a0428c6d1ef27b3aa15467a722ff6
NEXT-24677 - Limit admin session time · shopware/platform@cd7a89c · GitHubPatch;Third Party Advisory
Jump to