Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-3g43-x7qr-96ph: Possible CSRF token fixation

Impact

When authenticating users PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.

Patches

The problem is fixed in version 8.0.1

ghsa
#csrf#vulnerability#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-25170

Possible CSRF token fixation

Moderate severity GitHub Reviewed Published Mar 13, 2023 in PrestaShop/PrestaShop • Updated Mar 13, 2023

Package

composer prestashop/prestashop (Composer)

Affected versions

< 8.0.1

Impact

When authenticating users PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enables same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.

Patches

The problem is fixed in version 8.0.1

References

  • GHSA-3g43-x7qr-96ph
  • https://nvd.nist.gov/vuln/detail/CVE-2023-25170

Published by the National Vulnerability Database

Mar 13, 2023

Published to the GitHub Advisory Database

Mar 13, 2023

Last updated

Mar 13, 2023

Related news

CVE-2023-25170: Possible CSRF token fixation

PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1.

ghsa: Latest News

GHSA-8gc2-vq6m-rwjw: Amazon Redshift Python Connector vulnerable to SQL Injection