Lucene search

K
githubGitHub Advisory DatabaseGHSA-FH7R-996Q-GVCP
HistoryApr 25, 2023 - 7:47 p.m.

Possible XSS injection through Validate::isCleanHTML method

2023-04-2519:47:05
CWE-79
GitHub Advisory Database
github.com
21
xss
injection
prestashop
validatecore::iscleanhtml
security
patch
html
events

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.7%

Impact

ValidateCore::isCleanHTML() method of Prestashop misses hijickable events which can lead to XSS injection, allowed by the presence of pre-setup @keyframes methods.

This XSS which hijacks HTML attributes will be triggered without any interaction of the visitor/administrator which makes it as dangerous as a trivial XSS.

Contrary to most XSS which target HTML attributes and which are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope.

Patches

The patch will be on PS 8.0.4 and PS 1.7.8.9

References

Affected configurations

Vulners
Node
prestashopprestashopRange<1.7.8.9
OR
prestashopprestashopRange<8.0.4

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.7%

Related for GHSA-FH7R-996Q-GVCP