Skip to content

Commit 8e1891b

Browse files
1 parent 8fd7e77 commit 8e1891b

File tree

1 file changed

+66
-3
lines changed

1 file changed

+66
-3
lines changed

advisories/github-reviewed/2024/07/GHSA-55rf-8q29-4g43/GHSA-55rf-8q29-4g43.json

Lines changed: 66 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-55rf-8q29-4g43",
4-
"modified": "2024-07-17T19:13:34Z",
4+
"modified": "2026-03-09T15:54:21Z",
55
"published": "2024-07-17T14:32:18Z",
66
"aliases": [
77
"CVE-2024-40633"
88
],
99
"summary": "Sylius has a security vulnerability via adjustments API endpoint",
10-
"details": "### Impact\nA security vulnerability was discovered in the `/api/v2/shop/adjustments/{id}` endpoint, which retrieves order adjustments based on incremental integer IDs. The vulnerability allows an attacker to enumerate valid adjustment IDs and retrieve order tokens. Using these tokens, an attacker can access guest customer order details - sensitive guest customer information. \n\n### Patches\nThe issue is fixed in versions: 1.12.19, 1.13.4 and above. The `/api/v2/shop/adjustments/{id}` will always return `404` status.\n\n### Workarounds\n\nUsing YAML configuration:\n\nCreate `config/api_platform/Adjustment.yaml` file:\n\n```yaml\n# config/api_platform/Adjustment.yaml\n\n'%sylius.model.adjustment.class%':\n itemOperations:\n shop_get:\n controller: ApiPlatform\\Core\\Action\\NotFoundAction\n read: false\n output: false\n```\n\nOr using XML configuration:\n\nCopy the original configuration from vendor:\n\n```bash\ncp vendor/sylius/sylius/src/Sylius/Bundle/ApiBundle/Resources/config/api_resources/Adjustment.xml config/api_platform\n```\n\nAnd change the `shop_get` operation in copied `config/api_platform/Adjustment.xml` file:\n\n```xml\n<!-- config/api_platform/Adjustment.xml -->\n\n...\n<itemOperation name=\"shop_get\">\n <attribute name=\"method\">GET</attribute>\n <attribute name=\"path\">/shop/adjustments/{id}</attribute>\n <attribute name=\"controller\">ApiPlatform\\Core\\Action\\NotFoundAction</attribute>\n <attribute name=\"read\">false</attribute>\n <attribute name=\"output\">false</attribute>\n</itemOperation>\n...\n```\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n- Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)\n- Email us at [security@sylius.com](mailto:security@sylius.com)\n",
10+
"details": "### Impact\nA security vulnerability was discovered in the `/api/v2/shop/adjustments/{id}` endpoint, which retrieves order adjustments based on incremental integer IDs. The vulnerability allows an attacker to enumerate valid adjustment IDs and retrieve order tokens. Using these tokens, an attacker can access guest customer order details - sensitive guest customer information.\n\n### Patches\nThe issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.19, 1.13.4 and above.\nThe `/api/v2/shop/adjustments/{id}` will always return `404` status.\n\n### Workarounds\n\nUsing YAML configuration:\n\nCreate `config/api_platform/Adjustment.yaml` file:\n\n```yaml\n# config/api_platform/Adjustment.yaml\n\n'%sylius.model.adjustment.class%':\n itemOperations:\n shop_get:\n controller: ApiPlatform\\Core\\Action\\NotFoundAction\n read: false\n output: false\n```\n\nOr using XML configuration:\n\n> Note: This is the only way of disabling the vulnerable endpoint for Sylius 1.9, as YAML configuration is not supported in that version.\n\nCopy the original configuration from vendor:\n\n```bash\n# create directory if it doesn't exist\nmkdir -p config/api_platform\n\ncp vendor/sylius/sylius/src/Sylius/Bundle/ApiBundle/Resources/config/api_resources/Adjustment.xml config/api_platform\n```\n\nAnd change the `shop_get` operation in copied `config/api_platform/Adjustment.xml` file:\n\n```xml\n<!-- config/api_platform/Adjustment.xml -->\n\n...\n<itemOperation name=\"shop_get\">\n <attribute name=\"method\">GET</attribute>\n <attribute name=\"path\">/shop/adjustments/{id}</attribute>\n <attribute name=\"controller\">ApiPlatform\\Core\\Action\\NotFoundAction</attribute>\n <attribute name=\"read\">false</attribute>\n <attribute name=\"output\">false</attribute>\n</itemOperation>\n...\n```\n\nUpdate your API platform paths config if needed so the new configuration file is loaded:\n\n```yaml\n# config/packages/api_platform.yaml\napi_platform:\n mapping:\n paths:\n - '%kernel.project_dir%/vendor/sylius/sylius/src/Sylius/Bundle/ApiBundle/Resources/config/api_resources'\n ...\n - '%kernel.project_dir%/config/api_platform'\n```\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n- Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)\n- Email us at [security@sylius.com](mailto:security@sylius.com)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -29,7 +29,7 @@
2929
"type": "ECOSYSTEM",
3030
"events": [
3131
{
32-
"introduced": "0"
32+
"introduced": "1.12.0-alpha.1"
3333
},
3434
{
3535
"fixed": "1.12.19"
@@ -56,6 +56,69 @@
5656
]
5757
}
5858
]
59+
},
60+
{
61+
"package": {
62+
"ecosystem": "Packagist",
63+
"name": "sylius/sylius"
64+
},
65+
"ranges": [
66+
{
67+
"type": "ECOSYSTEM",
68+
"events": [
69+
{
70+
"introduced": "0"
71+
},
72+
{
73+
"fixed": "1.9.12"
74+
}
75+
]
76+
}
77+
]
78+
},
79+
{
80+
"package": {
81+
"ecosystem": "Packagist",
82+
"name": "sylius/sylius"
83+
},
84+
"ranges": [
85+
{
86+
"type": "ECOSYSTEM",
87+
"events": [
88+
{
89+
"introduced": "1.10.0-alpha.1"
90+
},
91+
{
92+
"fixed": "1.10.16"
93+
}
94+
]
95+
}
96+
],
97+
"database_specific": {
98+
"last_known_affected_version_range": "<= 1.10.15"
99+
}
100+
},
101+
{
102+
"package": {
103+
"ecosystem": "Packagist",
104+
"name": "sylius/sylius"
105+
},
106+
"ranges": [
107+
{
108+
"type": "ECOSYSTEM",
109+
"events": [
110+
{
111+
"introduced": "1.11.0-alpha.1"
112+
},
113+
{
114+
"fixed": "1.11.17"
115+
}
116+
]
117+
}
118+
],
119+
"database_specific": {
120+
"last_known_affected_version_range": "<= 1.11.16"
121+
}
59122
}
60123
],
61124
"references": [

0 commit comments

Comments
 (0)