Filtered by vendor Prestashop
Subscriptions
Total
124 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-47110 | 1 Prestashop | 1 Customer Reassurance Block | 2024-11-21 | 9.1 Critical |
blockreassurance adds an information block aimed at offering helpful information to reassure customers that their store is trustworthy. An ajax function in module blockreassurance allows modifying any value in the configuration table. This vulnerability has been patched in version 5.1.4. | ||||
CVE-2023-47109 | 1 Prestashop | 1 Customer Reassurance Block | 2024-11-21 | 5.5 Medium |
PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4. | ||||
CVE-2023-43664 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 4.3 Medium |
PrestaShop is an Open Source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method `ajaxProcessGetPossibleHookingListForModule` doesn't check access rights. This issue has been addressed in commit `15bd281c` which is included in version 8.1.2. Users are advised to upgrade. There are no known workaround for this issue. | ||||
CVE-2023-43663 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.3 Medium |
PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue. | ||||
CVE-2023-39530 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.5 Medium |
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete files from the server via the CustomerMessage API. Version 8.1.1 contains a patch for this issue. There are no known workarounds. | ||||
CVE-2023-39529 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.7 Medium |
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete a file from the server by using the Attachments controller and the Attachments API. Version 8.1.1 contains a patch for this issue. There are no known workarounds. | ||||
CVE-2023-39528 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.8 Medium |
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds. | ||||
CVE-2023-39527 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 8.3 High |
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to cross-site scripting through the `isCleanHTML` method. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds. | ||||
CVE-2023-39526 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 9.1 Critical |
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds. | ||||
CVE-2023-39525 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.5 Medium |
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, in the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path that uses the traversal path. Version 8.1.1 contains a patch for this issue. There are no known workarounds. | ||||
CVE-2023-39524 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.7 Medium |
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, SQL injection possible in the product search field, in BO's product page. Version 8.1.1 contains a patch for this issue. There are no known workarounds. | ||||
CVE-2023-36263 | 1 Prestashop | 1 Opartlimitquantity | 2024-11-21 | 9.8 Critical |
Prestashop opartlimitquantity 1.4.5 and before is vulnerable to SQL Injection. OpartlimitquantityAlertlimitModuleFrontController::displayAjaxPushAlertMessage()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection. | ||||
CVE-2023-33777 | 1 Prestashop | 1 Amazon | 2024-11-21 | 5.3 Medium |
An issue in /functions/fbaorder.php of Prestashop amazon before v5.2.24 allows attackers to execute a directory traversal attack. | ||||
CVE-2023-30153 | 1 Prestashop | 1 Payplug | 2024-11-21 | 9.8 Critical |
An SQL injection vulnerability in the Payplug (payplug) module for PrestaShop, in versions 3.6.0, 3.6.1, 3.6.2, 3.6.3, 3.7.0 and 3.7.1, allows remote attackers to execute arbitrary SQL commands via the ajax.php front controller. | ||||
CVE-2023-30151 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 9.8 Critical |
A SQL injection vulnerability in the Boxtal (envoimoinscher) module for PrestaShop, after version 3.1.10, allows remote attackers to execute arbitrary SQL commands via the `key` GET parameter. | ||||
CVE-2023-27570 | 1 Prestashop | 1 Eo Tags | 2024-11-21 | 9.8 Critical |
The eo_tags package before 1.4.19 for PrestaShop allows SQL injection via a crafted _ga cookie. | ||||
CVE-2023-27569 | 1 Prestashop | 1 Eo Tags | 2024-11-21 | 9.8 Critical |
The eo_tags package before 1.3.0 for PrestaShop allows SQL injection via an HTTP User-Agent or Referer header. | ||||
CVE-2023-25207 | 1 Prestashop | 1 Dpd France | 2024-11-21 | 9.8 Critical |
PrestaShop dpdfrance <6.1.3 is vulnerable to SQL Injection via dpdfrance/ajax.php. | ||||
CVE-2023-25206 | 1 Prestashop | 1 Advanced Reviews | 2024-11-21 | 8.8 High |
PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection. | ||||
CVE-2023-25170 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 5 Medium |
PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1. |