Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1243 | PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9 |
Github GHSA |
GHSA-8r4m-5p6p-52rp | Arbitrary file read via SQL injection |
Mon, 03 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-03T19:36:21.288Z
Reserved: 2023-04-12T15:19:33.767Z
Link: CVE-2023-30545
Updated: 2024-08-02T14:28:51.796Z
Status : Modified
Published: 2023-04-25T18:15:09.677
Modified: 2024-11-21T08:00:23.783
Link: CVE-2023-30545
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA