SQL injection vulnerability in Webkul Bundle Product 6.0.1 allows a remote attacker to execute arbitrary code via the id_product parameters in the UpdateProductQuantity function.
References
| Link | Resource |
|---|---|
| https://medium.com/%40nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91 | Exploit Third Party Advisory |
Configurations
History
29 Jan 2024, 19:38
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-89 | |
| First Time |
Webkul bundle Product
Webkul |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| Summary |
|
|
| References | () https://medium.com/%40nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:webkul:bundle_product:6.0.1:*:*:*:*:prestashop:*:* |
23 Jan 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-23 19:15
Updated : 2024-01-29 19:38
NVD link : CVE-2023-51210
Mitre link : CVE-2023-51210
CVE.ORG link : CVE-2023-51210
JSON object : View
Products Affected
webkul
- bundle_product
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
