PrestaShop vulnerable to SQL filter bypass leading to arbitrary write requests using "SQL Manager"
CVE-2023-30839

10CRITICAL

Key Information:

Vendor

Prestashop

Vendor
CVE Published:
25 April 2023

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2023-30839?

PrestaShop, an open-source e-commerce platform, is affected by a SQL filtering vulnerability in versions prior to 8.0.4 and 1.7.8.9. This flaw allows authorized Backend Office (BO) users to execute database operations such as writing, updating, and deleting data, even if they lack specific rights. This vulnerability can lead to unintended data manipulation and compromise the integrity of the database. PrestaShop versions 8.0.4 and 1.7.8.9 include a patch to mitigate this issue, and no workarounds are available.

Affected Version(s)

PrestaShop >= 8.0.0, < 8.0.4 < 8.0.0, 8.0.4

PrestaShop < 1.7.8.9 < 1.7.8.9

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.