CVE-2023-46347

In the module "Step by Step products Pack" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ndkdesign:ndk_steppingpack:*:*:*:*:*:prestashop:*:*

History

21 Nov 2024, 08:28

Type Values Removed Values Added
References () https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html - Third Party Advisory () https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html - Third Party Advisory

Information

Published : 2023-10-25 18:17

Updated : 2024-11-21 08:28


NVD link : CVE-2023-46347

Mitre link : CVE-2023-46347

CVE.ORG link : CVE-2023-46347


JSON object : View

Products Affected

ndkdesign

  • ndk_steppingpack
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')