PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/PrestaShop/PrestaShop/commit/cddac4198a47c602878a787280d813f60c6c0630 - Patch | |
References | () https://github.com/PrestaShop/PrestaShop/commit/d900806e1841a31f26ff0a1843a6888fc1bb7f81 - Patch | |
References | () https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8r4m-5p6p-52rp - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
Information
Published : 2023-04-25 18:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30545
Mitre link : CVE-2023-30545
CVE.ORG link : CVE-2023-30545
JSON object : View
Products Affected
prestashop
- prestashop
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')