PrestaShop CVE-2018-20717 vulnerability

Core

Score

8.8 High

Date publish

15-01-2019

Versiones afectadas

  • Less than 1.7.2.5

Description

In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0: followed by an integer, but does not consider 0:+ followed by an integer.

References

https://blog.ripstech.com/2018/prestasho...
Exploit Third Party Advisory mitre.org
https://build.prestashop.com/news/presta...
Release Notes Third Party Advisory mitre.org
https://blog.ripstech.com/2018/prestasho...
Exploit Third Party Advisory
https://build.prestashop.com/news/presta...
Release Notes Third Party Advisory

Metrics

cvssMetricV30
sourcenvd@nist.gov
typePrimary
version3.0
vectorStringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
baseScore8.8
baseSeverityHIGH
attackVectorNETWORK
attackComplexityLOW
privilegesRequiredLOW
userInteractionNONE
scopeUNCHANGED
confidentialityImpactHIGH
integrityImpactHIGH
availabilityImpactHIGH
exploitabilityScore2.8
impactScore5.9
cvssMetricV2
sourcenvd@nist.gov
typePrimary
version2.0
vectorStringAV:N/AC:L/Au:S/C:P/I:P/A:P
baseScore6.5
accessVectorNETWORK
accessComplexityLOW
authenticationSINGLE
confidentialityImpactPARTIAL
integrityImpactPARTIAL
availabilityImpactPARTIAL
baseSeverityMEDIUM
exploitabilityScore8
impactScore6.4
acInsufInfoFalse
obtainAllPrivilegeFalse
obtainUserPrivilegeFalse
obtainOtherPrivilegeFalse
userInteractionRequiredFalse
Scroll al inicio