Lucene search

K
githubGitHub Advisory DatabaseGHSA-VR7M-R9VM-M4WF
HistoryJan 03, 2024 - 9:48 p.m.

PrestaShop XSS can be stored in DB from "add a message form" in order detail page (FO)

2024-01-0321:48:56
CWE-79
GitHub Advisory Database
github.com
9
xss
stored in db
impact
iscleanhtml method
customer session
twig escape
fo
patches
8.1.x
reporter
rona febriana
linkedin

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

7 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%

Impact

The isCleanHtml method is not used on this this form, which makes it possible to store an xss in DB.
The impact is low because the html is not interpreted in BO, thanks to twig’s escape mechanism.
In FO, the xss is effective, but only impacts the customer sending it, or the customer session from which it was sent.

Be careful if you have a module fetching these messages from the DB and displaying it without escaping html.

Patches

8.1.x

Reporter

Reported by Rona Febriana (linkedin: https://www.linkedin.com/in/rona-febriana/)

Affected configurations

Vulners
Node
prestashopprestashopRange<8.1.3
CPENameOperatorVersion
prestashop/prestashoplt8.1.3

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

7 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%

Related for GHSA-VR7M-R9VM-M4WF