Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14eDY3LTJqM3YtaDc2cM4AAUSH
PrestaShop PHP Object Injection
In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0:
followed by an integer, but does not consider 0:+
followed by an integer.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14eDY3LTJqM3YtaDc2cM4AAUSH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 7 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-xx67-2j3v-h76p, CVE-2018-20717
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-20717
- https://blog.ripstech.com/2018/prestashop-remote-code-execution/
- https://build.prestashop.com/news/prestashop-1-7-2-5-maintenance-release/
- https://github.com/advisories/GHSA-xx67-2j3v-h76p
Affected Packages
packagist:prestashop/prestashop
Dependent packages: 0Dependent repositories: 2
Downloads: 3,526 total
Affected Version Ranges: < 1.7.2.5
Fixed in: 1.7.2.5
All affected versions:
All unaffected versions: 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5