CVE-2023-46347

In the module "Step by Step products Pack" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ndkdesign:ndk_steppingpack:*:*:*:*:*:prestashop:*:*

History

01 Nov 2023, 19:18

Type Values Removed Values Added
References (MISC) https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html - (MISC) https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html - Third Party Advisory
First Time Ndkdesign ndk Steppingpack
Ndkdesign
CPE cpe:2.3:a:ndkdesign:ndk_steppingpack:*:*:*:*:*:prestashop:*:*
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

25 Oct 2023, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-25 18:17

Updated : 2024-09-11 21:35


NVD link : CVE-2023-46347

Mitre link : CVE-2023-46347

CVE.ORG link : CVE-2023-46347


JSON object : View

Products Affected

ndkdesign

  • ndk_steppingpack
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')