Skip to content

Commit

Permalink
CVE-2024-28387-axonaut (#280)
Browse files Browse the repository at this point in the history
  • Loading branch information
touchweb-vincent authored Mar 19, 2024
1 parent f0c89a5 commit 01357b8
Showing 1 changed file with 65 additions and 0 deletions.
65 changes: 65 additions & 0 deletions _posts/2024-03-19-axonaut.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
---
layout: post
title: "[CVE-2024-28387] Exposure of Private Personal Information to an Unauthorized Actor in Axonaut module for PrestaShop"
categories: modules
author:
- TouchWeb.fr
- 202 Ecommerce
meta: "CVE,PrestaShop,axonaut"
severity: "medium (7.5), GDPR violation"
---

In the module "Axonaut" (axonaut) up to version 3.1.23 from Axonaut for PrestaShop, a guest can download personal information without restriction.

## Summary

* **CVE ID**: [CVE-2024-28387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28387)
* **Published at**: 2024-03-19
* **Platform**: PrestaShop
* **Product**: axonaut
* **Impacted release**: <= 3.1.23 (3.2.0 fixed the vulnerability)
* **Product author**: Axonaut
* **Weakness**: [CWE-359](https://cwe.mitre.org/data/definitions/359.html)
* **Severity**: medium (7.5), GDPR violation

## Description

Due to a lack of permissions control, a guest can access log file from the module which can lead to leak of personal information from ps_customer/ps_address tables such as email / full postal address


## CVSS base metrics

* **Attack vector**: network
* **Attack complexity**: low
* **Privilege required**: none
* **User interaction**: none
* **Scope**: unchanged
* **Confidentiality**: high
* **Integrity**: none
* **Availability**: none

**Vector string**: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

## Possible malicious usage

* Steal personal data

## Other recommendations

* It’s recommended to upgrade to the latest version of the module **axonaut**.
* You should restrict access to this URI pattern : modules/axonaut/ to a given whitelist

## Timeline

| Date | Action |
|--|--|
| 2023-07-18 | Issue discovered during a code review by [TouchWeb.fr](https://www.touchweb.fr) |
| 2023-07-18 | Contact Author to confirm version scope |
| 2023-07-20 | Author confirms version scope and provide a patch |
| 2024-03-11 | Received CVE ID |
| 2024-03-19 | Publish this security advisory |

## Links

* [Author product page](https://axonaut.com/integration/detail/prestashop)
* [National Vulnerability Database](https://nvd.nist.gov/vuln/detail/CVE-2024-28387)

0 comments on commit 01357b8

Please sign in to comment.