CVE-2023-46353

In the module "Product Tag Icons Pro" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
References
Link Resource
https://security.friendsofpresta.org/modules/2023/11/28/ticons.html Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mypresta:product_tag_icons_pro:*:*:*:*:*:prestashop:*:*

History

09 Dec 2023, 04:52

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Mypresta
Mypresta product Tag Icons Pro
CPE cpe:2.3:a:mypresta:product_tag_icons_pro:*:*:*:*:*:prestashop:*:*
References () https://security.friendsofpresta.org/modules/2023/11/28/ticons.html - () https://security.friendsofpresta.org/modules/2023/11/28/ticons.html - Mitigation, Third Party Advisory

06 Dec 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-06 23:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-46353

Mitre link : CVE-2023-46353

CVE.ORG link : CVE-2023-46353


JSON object : View

Products Affected

mypresta

  • product_tag_icons_pro
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')