The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.
History

Wed, 16 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Seur
Seur seur
CPEs cpe:2.3:a:seur:seur:*:*:*:*:*:prestashop:*:*
Vendors & Products Seur
Seur seur

Thu, 10 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Seur Oficial Project
Seur Oficial Project seur Oficial
CPEs cpe:2.3:a:seur_oficial_project:seur_oficial:-:*:*:*:*:wordpress:*:*
Vendors & Products Seur Oficial Project
Seur Oficial Project seur Oficial
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 10:45:00 +0000

Type Values Removed Values Added
Description The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.
Title SQL injection vulnerability in SEUR plugin
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2024-10-10T10:25:50.915Z

Updated: 2024-10-10T13:52:51.793Z

Reserved: 2024-09-26T10:11:09.137Z

Link: CVE-2024-9201

cve-icon Vulnrichment

Updated: 2024-10-10T13:52:43.153Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-10T11:15:13.760

Modified: 2024-10-16T16:55:44.817

Link: CVE-2024-9201

cve-icon Redhat

No data.