Lucene search

K
githubGitHub Advisory DatabaseGHSA-5V44-7647-XFW9
HistoryJan 20, 2021 - 9:33 p.m.

Blind SQL injection in PrestaShop productcomments module

2021-01-2021:33:53
CWE-89
GitHub Advisory Database
github.com
52
prestashop
sql injection
productcomments
mysql
patch
4.2.1

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

EPSS

0.019

Percentile

88.5%

Impact

An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service.

Patches

The problem is fixed in 4.2.1

Affected configurations

Vulners
Node
prestashopproductcommentsRange4.0.0–4.2.1
VendorProductVersionCPE
prestashopproductcomments*cpe:2.3:a:prestashop:productcomments:*:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

EPSS

0.019

Percentile

88.5%