Lucene search

K
cve[email protected]CVE-2023-43663
HistorySep 28, 2023 - 7:15 p.m.

CVE-2023-43663

2023-09-2819:15:10
CWE-269
web.nvd.nist.gov
33
prestashop
e-commerce
web application
cve-2023-43663
module disabling
security vulnerability
upgrade advice

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

4.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.9%

PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit ce1f6708 addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

Vulners
NVD
Node
prestashopprestashopRange<8.1.2
VendorProductVersionCPE
prestashopprestashop*cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "PrestaShop",
    "product": "PrestaShop",
    "versions": [
      {
        "version": "< 8.1.2",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

4.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.9%

Related for CVE-2023-43663