2024-05-19 02:03:31 +00:00

63 lines
3.2 KiB
JSON

{
"id": "CVE-2024-34716",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T16:17:28.073",
"lastModified": "2024-05-14T19:17:55.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag."
},
{
"lang": "es",
"value": "PrestaShop es una aplicaci\u00f3n web de comercio electr\u00f3nico de c\u00f3digo abierto. Una vulnerabilidad de Cross Site Scripting (XSS) que solo afecta a PrestaShops con el indicador de funci\u00f3n de hilo de cliente habilitado est\u00e1 presente a partir de PrestaShop 8.1.0 y antes de PrestaShop 8.1.6. Cuando el indicador de funci\u00f3n del hilo del cliente est\u00e1 habilitado a trav\u00e9s del formulario de contacto del front-office, un pirata inform\u00e1tico puede cargar un archivo malicioso que contenga un XSS que se ejecutar\u00e1 cuando un administrador abra el archivo adjunto en el back-office. El script inyectado puede acceder a la sesi\u00f3n y al token de seguridad, lo que le permite realizar cualquier acci\u00f3n autenticada en el \u00e1mbito del derecho de administrador. Esta vulnerabilidad est\u00e1 parcheada en 8.1.6. Una workaround es desactivar el indicador de funci\u00f3n del hilo del cliente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/PrestaShop/PrestaShop/releases/tag/8.1.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-45vm-3j38-7p78",
"source": "security-advisories@github.com"
}
]
}