BIT-prestashop-2024-21628

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/prestashop/BIT-prestashop-2024-21628.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-prestashop-2024-21628
Aliases
Published
2024-03-06T11:02:17.596Z
Modified
2024-11-27T19:40:48.342Z
Summary
[none]
Details

PrestaShop is an open-source e-commerce platform. Prior to version 8.1.3, the isCleanHtml method is not used on this this form, which makes it possible to store a cross-site scripting payload in the database. The impact is low because the HTML is not interpreted in BO, thanks to twig's escape mechanism. In FO, the cross-site scripting attack is effective, but only impacts the customer sending it, or the customer session from which it was sent. This issue affects those who have a module fetching these messages from the DB and displaying it without escaping HTML. Version 8.1.3 contains a patch for this issue.

Database specific
{
    "cpes": [
        "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / prestashop

Package

Name
prestashop
Purl
pkg:bitnami/prestashop

Severity

  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.1.3