CVE-2023-30545
Description
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9
CWE
- CWE-89 — CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Affected
- PrestaShop / PrestaShop — v=< 1.7.8.9 [affected]; v=>= 8.0.0, < 8.0.4 [affected]
CVSS
- 3.1 score=7.7 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
References
- https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8r4m-5p6p-52rp x_refsource_CONFIRM
- https://github.com/PrestaShop/PrestaShop/commit/cddac4198a47c602878a787280d813f60c6c0630 x_refsource_MISC
- https://github.com/PrestaShop/PrestaShop/commit/d900806e1841a31f26ff0a1843a6888fc1bb7f81 x_refsource_MISC
Source
cvelistV5-main/cves/2023/30xxx/CVE-2023-30545.json