CVE-2023-27847 Scanner
CVE-2023-27847 Scanner - SQL Injection vulnerability in PrestaShop xipblog
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
1 minute
Time Interval
19 days 5 hours
Scan only one
Domain, IPv4
Toolbox
-
The PrestaShop xipblog module is commonly used by online store owners to maintain a blog on their e-commerce websites. This module provides a platform to publish articles, news, and updates related to products or the store itself. It is integrated with the PrestaShop framework, making it a popular choice for businesses looking to enhance their website content. Such modules are typically used by businesses of various sizes, mostly small to medium-sized enterprises that run their online stores on PrestaShop. They help keep customers engaged with fresh and relevant content. In terms of purpose, the xipblog module is focused on content marketing and customer retention.
The SQL Injection vulnerability in the PrestaShop xipblog module allows an anonymous user to execute arbitrary SQL queries. This vulnerability arises when user inputs are improperly sanitized, enabling attackers to manipulate database queries. It is a critical issue since SQL injection can lead to unauthorized access to sensitive data. The vulnerability can result in data leaks and potentially compromise the integrity of the database. Such vulnerabilities can be exploited remotely, posing significant risks to websites using this module. Although a patch has been issued at version 2.0.1, the version increment was improperly handled.
The vulnerability primarily affects the blog archive listing feature of the xipblog module. The parameters 'id', 'page_type', 'rewrite', and 'subpage_type' in the HTTP GET requests are susceptible to injection. Attackers can use specially crafted input to alter and execute unexpected SQL commands. One method of exploitation involves using UNION-based injection to extract data. Another method involves using time-based blind SQL injection to infer database information based on response times. Due to the high severity of the vulnerability, it requires immediate attention and mitigation efforts to protect user data.
If successfully exploited, this SQL Injection vulnerability could have severe consequences for the affected system. Attackers might gain unauthorized access to confidential customer information, such as usernames, passwords, and order details. They could modify or delete critical database records, leading to data loss or corruption. The database integrity might be severely compromised, hampering the business operations of the affected e-commerce site. Furthermore, attackers may utilize the access to inject additional malware or carry out further attacks within the network. This situation could lead to financial losses and damage to the business’s reputation.
REFERENCES