CVE-2022-36102: Shopware access control list bypassed via crafted specific URLs
6.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.68899%
CWE
Published
9/16/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| shopware/shopware | composer | <= 5.7.14 | 5.7.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper ACL enforcement when backend controllers are accessed via specific URL patterns. The root cause likely involves: (1) The preDispatch method in backend controllers (where ACL checks are typically enforced) failing to handle non-standard controller/action parameter formats, allowing bypass via crafted URLs. (2) The ACL system's controller/action resolution logic not properly normalizing input parameters, causing mismatches between requested resources and permission checks. The high confidence in AbstractController::preDispatch stems from its role as the primary ACL enforcement point, while the medium confidence in Acl::isAllowed reflects potential normalization flaws in permission mapping.