CVE-2020-15162

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15162
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15162.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-15162
Related
  • GHSA-rc8c-v7rq-q392
Published
2020-09-24T23:15:13.807Z
Modified
2025-11-14T10:50:18.093466Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8.

References

Affected packages

Git / github.com/prestashop/prestashop

Affected ranges

Type
GIT
Repo
https://github.com/prestashop/prestashop
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.5.3.0
1.5.4.1
1.5.6.0
1.5.6.1
1.5.6.2
1.6.0.1
1.6.0.11
1.6.0.12
1.6.0.13
1.6.0.14
1.6.0.2
1.6.0.3
1.6.0.4
1.6.0.5
1.6.0.6
1.6.0.7
1.6.0.8
1.6.0.9
1.6.1.0
1.6.1.1
1.6.1.2-RC3
1.7.0.0
1.7.0.0-beta.1.0
1.7.0.0-beta.2.0
1.7.0.0-beta.3.0
1.7.0.0-beta.4.0
1.7.0.0-rc.0.0
1.7.0.1
1.7.0.2
1.7.0.3
1.7.0.4
1.7.0.5
1.7.0.6
1.7.1.0
1.7.1.1
1.7.1.2
1.7.2.0
1.7.2.0-rc.1.0
1.7.2.1
1.7.2.2
1.7.2.3
1.7.2.4
1.7.3.0
1.7.3.1
1.7.3.2
1.7.3.3
1.7.3.4
1.7.4.0
1.7.4.1
1.7.4.2
1.7.4.3
1.7.5.0
1.7.5.0-rc.1
1.7.5.1
1.7.6.0
1.7.6.0-beta.1
1.7.6.0-rc.1
1.7.6.0-rc.2
1.7.6.1
1.7.6.2
1.7.6.3
1.7.6.4
1.7.6.5
1.7.6.6
1.7.6.7

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15162.json"