In the module "Step by Step products Pack" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
References
Link | Resource |
---|---|
https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html | Third Party Advisory |
Configurations
History
01 Nov 2023, 19:18
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html - Third Party Advisory | |
First Time |
Ndkdesign ndk Steppingpack
Ndkdesign |
|
CPE | cpe:2.3:a:ndkdesign:ndk_steppingpack:*:*:*:*:*:prestashop:*:* | |
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
25 Oct 2023, 18:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-25 18:17
Updated : 2024-09-11 21:35
NVD link : CVE-2023-46347
Mitre link : CVE-2023-46347
CVE.ORG link : CVE-2023-46347
JSON object : View
Products Affected
ndkdesign
- ndk_steppingpack
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')