In the module "Product Tag Icons Pro" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
References
Link | Resource |
---|---|
https://security.friendsofpresta.org/modules/2023/11/28/ticons.html | Mitigation Third Party Advisory |
https://security.friendsofpresta.org/modules/2023/11/28/ticons.html | Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 08:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.friendsofpresta.org/modules/2023/11/28/ticons.html - Mitigation, Third Party Advisory |
09 Dec 2023, 04:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.friendsofpresta.org/modules/2023/11/28/ticons.html - Mitigation, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:mypresta:product_tag_icons_pro:*:*:*:*:*:prestashop:*:* | |
CWE | CWE-89 |
06 Dec 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-06 23:15
Updated : 2024-11-21 08:28
NVD link : CVE-2023-46353
Mitre link : CVE-2023-46353
CVE.ORG link : CVE-2023-46353
JSON object : View
Products Affected
mypresta
- product_tag_icons_pro
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')