PrestaShop postfinance <= 17.1.13 is vulnerable to SQL Injection via PostfinanceValidationModuleFrontController::postProcess().
References
Link | Resource |
---|---|
https://friends-of-presta.github.io/security-advisories/modules/2023/06/13/postfinance.html | Patch Third Party Advisory |
https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html | Product |
https://friends-of-presta.github.io/security-advisories/modules/2023/06/13/postfinance.html | Patch Third Party Advisory |
https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html | Product |
Configurations
History
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://friends-of-presta.github.io/security-advisories/modules/2023/06/13/postfinance.html - Patch, Third Party Advisory | |
References | () https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html - Product |
23 Jun 2023, 17:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webbax:postfinance:*:*:*:*:*:prestashop:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-89 | |
First Time |
Webbax postfinance
Webbax |
|
References | (MISC) https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html - Product | |
References | (MISC) https://friends-of-presta.github.io/security-advisories/modules/2023/06/13/postfinance.html - Patch, Third Party Advisory |
14 Jun 2023, 18:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-14 18:15
Updated : 2024-11-21 08:02
NVD link : CVE-2023-31671
Mitre link : CVE-2023-31671
CVE.ORG link : CVE-2023-31671
JSON object : View
Products Affected
webbax
- postfinance
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')