In the module "PireosPay" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`
References
Link | Resource |
---|---|
https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html | Exploit Patch Third Party Advisory |
https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html - Exploit, Patch, Third Party Advisory |
23 Oct 2023, 13:53
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html - Exploit, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-89 | |
CPE | cpe:2.3:a:01generator:pireospay:*:*:*:*:*:prestashop:*:* | |
First Time |
01generator pireospay
01generator |
17 Oct 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-17 05:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45375
Mitre link : CVE-2023-45375
CVE.ORG link : CVE-2023-45375
JSON object : View
Products Affected
01generator
- pireospay
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')