aftermailpresta- PrestaShop module vulnerability (CVE-2023-30154)
Moduleaftermailpresta
Score
9.8 CriticalDate publish
14-10-2023Versiones afectadas
- Less than 2.2.1
Description
Multiple improper neutralization of SQL parameters in module AfterMail (aftermailpresta) for PrestaShop, before version 2.2.1, allows remote attackers to perform SQL injection attacks via `id_customer`, `id_conf`, `id_product` and `token` parameters in `aftermailajax.php via the 'id_product' parameter in hooks DisplayRightColumnProduct and DisplayProductButtons.References
Metrics
| cvssMetricV31 | |||||
|---|---|---|---|---|---|
| source | nvd@nist.gov | ||||
| type | Primary | ||||
| version | 3.1 | ||||
| vectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||||
| baseScore | 9.8 | ||||
| baseSeverity | CRITICAL | ||||
| attackVector | NETWORK | ||||
| attackComplexity | LOW | ||||
| privilegesRequired | NONE | ||||
| userInteraction | NONE | ||||
| scope | UNCHANGED | ||||
| confidentialityImpact | HIGH | ||||
| integrityImpact | HIGH | ||||
| availabilityImpact | HIGH | ||||
| exploitabilityScore | 3.9 | ||||
| impactScore | 5.9 | ||||
