Miggo Logo

GHSA-88rc-3p98-rgvx: After order payment process manipulation in shopware/platform and shopware/core

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
4/13/2021
Updated
1/9/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
shopware/platformcomposer<= 6.3.5.26.3.5.3
shopware/corecomposer<= 6.3.5.26.3.5.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information and security advisories do not include concrete code diffs or explicit references to modified functions. While the CWE-668 context suggests potential issues in payment state handling or order processing functions, there is insufficient evidence in the provided materials to identify specific function names, file paths, or patch changes required for runtime detection. Without access to the actual security patches or commit details showing modified code locations, we cannot confidently map the vulnerability to precise function signatures that would appear in a profiler.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t **t*r or**r p*ym*nt pro**ss m*nipul*tion ### P*t***s W* r**omm*n* to up**t* to t** *urr*nt v*rsion *.*.*.*. You **n **t t** up**t* to *.*.*.* r**ul*rly vi* t** *uto-Up**t*r or *ir**tly vi* t** *ownlo** ov*rvi*w. *ttps://www.s*opw*r*.*om

Reasoning

T** provi*** vuln*r**ility in*orm*tion *n* s**urity **visori*s *o not in*lu** *on*r*t* *o** *i**s or *xpli*it r***r*n**s to mo*i*i** *un*tions. W*il* t** *W*-*** *ont*xt su***sts pot*nti*l issu*s in p*ym*nt st*t* **n*lin* or or**r pro**ssin* *un*tion