GHSA-5v44-7647-xfw9

Suggest an improvement
Source
https://github.com/advisories/GHSA-5v44-7647-xfw9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/01/GHSA-5v44-7647-xfw9/GHSA-5v44-7647-xfw9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5v44-7647-xfw9
Aliases
Published
2021-01-20T21:33:53Z
Modified
2023-11-08T04:03:16.126719Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H CVSS Calculator
Summary
Blind SQL injection in PrestaShop productcomments module
Details

Impact

An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service.

Patches

The problem is fixed in 4.2.1

Database specific
{
    "nvd_published_at": "2020-12-03T21:15:00Z",
    "github_reviewed_at": "2021-01-20T21:33:26Z",
    "severity": "LOW",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-89"
    ]
}
References

Affected packages

Packagist / prestashop/productcomments

Package

Name
prestashop/productcomments
Purl
pkg:composer/prestashop/productcomments

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
4.2.1

Affected versions

v4.*

v4.0.0
v4.0.1
v4.1.0
v4.2.0