PrestaShop CVE-2024-21628 vulnerability
Core
Score
6.1 MediumDate publish
02-01-2024Versiones afectadas
- Less than 8.1.3
Description
PrestaShop is an open-source e-commerce platform. Prior to version 8.1.3, the isCleanHtml method is not used on this this form, which makes it possible to store a cross-site scripting payload in the database. The impact is low because the HTML is not interpreted in BO, thanks to twig's escape mechanism. In FO, the cross-site scripting attack is effective, but only impacts the customer sending it, or the customer session from which it was sent. This issue affects those who have a module fetching these messages from the DB and displaying it without escaping HTML. Version 8.1.3 contains a patch for this issue.References
Metrics
| cvssMetricV31 | |||||
|---|---|---|---|---|---|
| source | security-advisories@github.com | nvd@nist.gov | |||
| type | Secondary | Primary | |||
| version | 3.1 | 3.1 | |||
| vectorString | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | |||
| baseScore | 5.4 | 6.1 | |||
| baseSeverity | MEDIUM | MEDIUM | |||
| attackVector | NETWORK | NETWORK | |||
| attackComplexity | LOW | LOW | |||
| privilegesRequired | LOW | NONE | |||
| userInteraction | REQUIRED | REQUIRED | |||
| scope | CHANGED | CHANGED | |||
| confidentialityImpact | LOW | LOW | |||
| integrityImpact | NONE | LOW | |||
| availabilityImpact | LOW | NONE | |||
| exploitabilityScore | 2.3 | 2.8 | |||
| impactScore | 2.7 | 2.7 | |||
