Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS14Z3BtLXEzbXEtNDZycc4AA4Lv

PrestaShop some attribute not escaped in Validate::isCleanHTML method

Description

Some event attributes are not detected by the isCleanHTML method

Impact

Some modules using the isCleanHTML method could be vulnerable to xss

Patches

8.1.3, 1.7.8.11

Workarounds

The best workaround is to use the HTMLPurifier library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of HTML type will call isCleanHTML.

Reporters

Reported by Antonio Russo (@Antonio-R1 on GitHub) and Antonio Rocco Spataro (@antoniospataro on GitHub).

Permalink: https://github.com/advisories/GHSA-xgpm-q3mq-46rq
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14Z3BtLXEzbXEtNDZycc4AA4Lv
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 4 months ago
Updated: 4 months ago


CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N

Identifiers: GHSA-xgpm-q3mq-46rq, CVE-2024-21627
References: Repository: https://github.com/PrestaShop/PrestaShop
Blast Radius: 2.4

Affected Packages

packagist:prestashop/prestashop
Dependent packages: 0
Dependent repositories: 2
Downloads: 3,526 total
Affected Version Ranges: < 1.7.8.11, >= 8.0.0-beta.1, < 8.1.3
Fixed in: 1.7.8.11, 8.1.3
All affected versions: 8.0.0, 8.0.0-beta.1, 8.0.0-rc.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5
All unaffected versions: