PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1.
References
Link | Resource |
---|---|
https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3g43-x7qr-96ph | Vendor Advisory |
https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3g43-x7qr-96ph | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3g43-x7qr-96ph - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.0 |
07 Nov 2023, 04:08
Type | Values Removed | Values Added |
---|---|---|
Summary | PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1. |
Information
Published : 2023-03-13 17:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25170
Mitre link : CVE-2023-25170
CVE.ORG link : CVE-2023-25170
JSON object : View
Products Affected
prestashop
- prestashop
CWE
CWE-352
Cross-Site Request Forgery (CSRF)