jmssetting- PrestaShop module vulnerability (CVE-2023-50030)

Modulejmssetting

Score

9.8 Critical

Date publish

19-01-2024

Versiones afectadas

  • Up to and including 1.1.0

Description

In the module "Jms Setting" (jmssetting) from Joommasters for PrestaShop, a guest can perform SQL injection in versions <= 1.1.0. The method `JmsSetting::getSecondImgs()` has a sensitive SQL call that can be executed with a trivial http call and exploited to forge a blind SQL injection.

References

https://security.friendsofpresta.org/mod...
Exploit Patch Third Party Advisory mitre.org
https://security.friendsofpresta.org/mod...
Exploit Patch Third Party Advisory

Metrics

cvssMetricV31
sourcenvd@nist.gov134c704f-9b21-4f2e-91b3-4a467353bcc0
typePrimarySecondary
version3.13.1
vectorStringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
baseScore9.89.8
baseSeverityCRITICALCRITICAL
attackVectorNETWORKNETWORK
attackComplexityLOWLOW
privilegesRequiredNONENONE
userInteractionNONENONE
scopeUNCHANGEDUNCHANGED
confidentialityImpactHIGHHIGH
integrityImpactHIGHHIGH
availabilityImpactHIGHHIGH
exploitabilityScore3.93.9
impactScore5.95.9
Scroll al inicio