In the module "Step by Step products Pack" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
References
Link | Resource |
---|---|
https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html | Third Party Advisory |
https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 08:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html - Third Party Advisory |
Information
Published : 2023-10-25 18:17
Updated : 2024-11-21 08:28
NVD link : CVE-2023-46347
Mitre link : CVE-2023-46347
CVE.ORG link : CVE-2023-46347
JSON object : View
Products Affected
ndkdesign
- ndk_steppingpack
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')