First published: Fri Jun 02 2023(Updated: )
SQL injection vulnerability in the City Autocomplete (cityautocomplete) module from ebewe.net for PrestaShop, prior to version 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7), allows remote attackers to execute arbitrary SQL commands via the type, input_name. or q parameter in the autocompletion.php front controller.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ebewe City Autocomplete | <1.8.12 | |
Prestashop Prestashop | =1.5.0.0 | |
Prestashop Prestashop | =1.6.0.0 | |
Ebewe City Autocomplete | <2.0.3 | |
Prestashop Prestashop | =1.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30149 is a SQL injection vulnerability in the City Autocomplete module for PrestaShop, versions prior to 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7), allowing remote attackers to execute arbitrary SQL commands.
CVE-2023-30149 is considered critical with a severity rating of 9.8.
CVE-2023-30149 affects PrestaShop versions prior to 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7).
To fix CVE-2023-30149, it is recommended to update the City Autocomplete module to version 1.8.12 (for PrestaShop version 1.5/1.6) or version 2.0.3 (for PrestaShop version 1.7).
The CWE for CVE-2023-30149 is CWE-89, which refers to Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').