The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seur
Seur seur |
|
CPEs | cpe:2.3:a:seur:seur:*:*:*:*:*:prestashop:*:* | |
Vendors & Products |
Seur
Seur seur |
Thu, 10 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seur Oficial Project
Seur Oficial Project seur Oficial |
|
CPEs | cpe:2.3:a:seur_oficial_project:seur_oficial:-:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Seur Oficial Project
Seur Oficial Project seur Oficial |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint. | |
Title | SQL injection vulnerability in SEUR plugin | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: INCIBE
Published: 2024-10-10T10:25:50.915Z
Updated: 2024-10-10T13:52:51.793Z
Reserved: 2024-09-26T10:11:09.137Z
Link: CVE-2024-9201
Vulnrichment
Updated: 2024-10-10T13:52:43.153Z
NVD
Status : Analyzed
Published: 2024-10-10T11:15:13.760
Modified: 2024-10-16T16:55:44.817
Link: CVE-2024-9201
Redhat
No data.