Vulnerability Description
SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mpay24 Project | Mpay24 | <= 1.5.1 |
Related Weaknesses (CWE)
References
- http://osvdb.org/show/osvdb/110737
- http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-InformatioExploitPatch
- http://seclists.org/fulldisclosure/2014/Sep/23ExploitPatch
- http://www.exploit-db.com/exploits/34586ExploitPatch
- http://www.securityfocus.com/bid/69560Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95720
- http://osvdb.org/show/osvdb/110737
- http://packetstormsecurity.com/files/128136/Mpay24-Payment-Module-1.5-InformatioExploitPatch
- http://seclists.org/fulldisclosure/2014/Sep/23ExploitPatch
- http://www.exploit-db.com/exploits/34586ExploitPatch
- http://www.securityfocus.com/bid/69560Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95720
FAQ
What is CVE-2014-2008?
CVE-2014-2008 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.
How severe is CVE-2014-2008?
CVE-2014-2008 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2008?
Check the references section above for vendor advisories and patch information. Affected products include: Mpay24 Project Mpay24.