CVE-2023-30545: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function LOAD_FILE
in a SELECT
request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9
References
- github.com/PrestaShop/PrestaShop/commit/cddac4198a47c602878a787280d813f60c6c0630
- github.com/PrestaShop/PrestaShop/commit/d900806e1841a31f26ff0a1843a6888fc1bb7f81
- github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8r4m-5p6p-52rp
- github.com/advisories/GHSA-8r4m-5p6p-52rp
- nvd.nist.gov/vuln/detail/CVE-2023-30545
Detect and mitigate CVE-2023-30545 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →