-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
CVE-2023-48926 totloyaltyadvanced (#207)
* CVE-2023-48926 totloyaltyadvanced * Update 2024-01-09-totloyaltyadvanced.md * Update 2024-01-09-totloyaltyadvanced.md --------- Co-authored-by: Clotaire <[email protected]>
- Loading branch information
1 parent
0498984
commit 163cb12
Showing
1 changed file
with
69 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
--- | ||
layout: post | ||
title: "[CVE-2023-48926] Insecure Direct Object Reference in Advanced Loyalty Program: Loyalty Points module for PrestaShop" | ||
categories: modules | ||
author: | ||
- TouchWeb.fr | ||
- 202 Ecommerce | ||
- Friends-Of-Presta.org | ||
meta: "CVE,PrestaShop,totloyaltyadvanced" | ||
severity: "critical (7.5)" | ||
--- | ||
|
||
In the module "Advanced Loyalty Program: Loyalty Points" (totloyaltyadvanced) from 2.3.3 to version 2.3.4 from 202 ecommerce for PrestaShop, a guest can change an order status. | ||
|
||
## Summary | ||
|
||
* **CVE ID**: [CVE-2023-48926](https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-jp2c-mj65-qpmw) | ||
* **Published at**: 2024-01-09 | ||
* **Platform**: PrestaShop | ||
* **Product**: totloyaltyadvanced | ||
* **Advisory source**: [202 ecommerce](https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-jp2c-mj65-qpmw) | ||
* **Impacted release**: >=2.3.3 and <2.3.4 (2.3.4 fix the issue) | ||
* **Product author**: 202 ecommerce | ||
* **Weakness**: [CWE-639](https://cwe.mitre.org/data/definitions/639.html) | ||
* **Severity**: critical (7.5) | ||
|
||
## Description | ||
|
||
The orderstatus front controller suffers from a logical weakness. | ||
|
||
|
||
## CVSS base metrics | ||
|
||
* **Attack vector**: network | ||
* **Attack complexity**: low | ||
* **Privilege required**: none | ||
* **User interaction**: none | ||
* **Scope**: unchanged | ||
* **Confidentiality**: none | ||
* **Integrity**: high | ||
* **Availability**: none | ||
|
||
**Vector string**: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | ||
|
||
## Possible malicious usage | ||
|
||
* Confirm an unpaid cart | ||
|
||
|
||
## Patch | ||
|
||
Remove file `controllers/front/orderstatus.php` | ||
|
||
|
||
## Timeline | ||
|
||
| Date | Action | | ||
|--|--| | ||
| 2023-10-22 | Issue discovered during a code review by [TouchWeb.fr](https://www.touchweb.fr) | | ||
| 2023-10-22 | Contact Author to confirm version scope by author | | ||
| 2023-11-09 | Publish a new release on addons | | ||
| 2023-11-15 | Request a CVE ID | | ||
| 2024-01-09 | Publish this advisory | | ||
|
||
## Links | ||
|
||
* [Advisory source](https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-jp2c-mj65-qpmw) | ||
* [PrestaShop addons product page](https://addons.prestashop.com/en/referral-loyalty-programs/7301-advanced-loyalty-program-loyalty-points.html) | ||
* [National Vulnerability Database](https://nvd.nist.gov/vuln/detail/CVE-2023-48926) |