First published: Tue Apr 25 2023(Updated: )
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prestashop Prestashop | <1.7.8.9 | |
Prestashop Prestashop | >=8.0.0<8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30545 is a vulnerability in PrestaShop that allows an authenticated user to read any file on the operating system using the SQL function LOAD_FILE in a SELECT request.
The severity of CVE-2023-30545 is high with a CVSS score of 6.5.
PrestaShop versions up to 1.7.8.9 and between 8.0.0 and 8.0.4 are affected by CVE-2023-30545.
An attacker can exploit CVE-2023-30545 by gaining access to the SQL Manager in PrestaShop and using the LOAD_FILE SQL function in a SELECT request to read arbitrary files on the operating system.
Yes, the fix for CVE-2023-30545 is available in PrestaShop versions 1.7.8.9 and 8.0.4.