Lucene search

K
githubGitHub Advisory DatabaseGHSA-95HX-62RH-GG96
HistorySep 15, 2020 - 5:34 p.m.

Potential XSS injection In PrestaShop contactform

2020-09-1517:34:17
CWE-79
GitHub Advisory Database
github.com
30
prestashop
contact form
xss injection
javascript
v4.3.0
cwe-79

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS

0.002

Percentile

61.0%

Impact

An attacker is able to inject javascript while using the contact form.

Patches

The problem is fixed in v4.3.0

References

Cross-site Scripting (XSS) - Stored (CWE-79)

Affected configurations

Vulners
Node
prestashopcontactformRange1.0.1
OR
prestashopcontactformRange<4.3.0
VendorProductVersionCPE
prestashopcontactform*cpe:2.3:a:prestashop:contactform:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS

0.002

Percentile

61.0%

Related for GHSA-95HX-62RH-GG96