The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.
Fixes

Solution

This vulnerability has already been fixed by SEUR in version 2.5.11, published on 04/16/2024. The latest version available is 2.5.14. SEUR recommends its customers to connect to its platform to download and update to the latest version of the module.


Workaround

No workaround given by the vendor.

History

Wed, 16 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Seur
Seur seur
CPEs cpe:2.3:a:seur:seur:*:*:*:*:*:prestashop:*:*
Vendors & Products Seur
Seur seur

Thu, 10 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Seur Oficial Project
Seur Oficial Project seur Oficial
CPEs cpe:2.3:a:seur_oficial_project:seur_oficial:-:*:*:*:*:wordpress:*:*
Vendors & Products Seur Oficial Project
Seur Oficial Project seur Oficial
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 10:45:00 +0000

Type Values Removed Values Added
Description The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.
Title SQL injection vulnerability in SEUR plugin
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-10-10T13:52:51.793Z

Reserved: 2024-09-26T10:11:09.137Z

Link: CVE-2024-9201

cve-icon Vulnrichment

Updated: 2024-10-10T13:52:43.153Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-10T11:15:13.760

Modified: 2024-10-16T16:55:44.817

Link: CVE-2024-9201

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.