Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2023-46347 — AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in PrestaShop module `ndk_steppingpack`. <br>💥 **Consequences**: Attackers can manipulate database queries, potentially leading to data theft or system compromise.…

Q2Root Cause? (CWE/Flaw)

🛡️ **Root Cause**: The function `NdkSpack::getPacks()` contains an SQL injection flaw.…

Q3Who is affected? (Versions/Components)

📦 **Affected**: PrestaShop installations using the **NDK Design** module `ndk_steppingpack`. <br>📅 **Version**: Versions **up to 1.5.6** are vulnerable.…

Q4What can hackers do? (Privileges/Data)

🕵️ **Hackers Can**: Perform **SQL Injection** as a **guest** (unauthenticated user).…

Q5Is exploitation threshold high? (Auth/Config)

🔓 **Threshold**: **LOW**. <br>👤 **Auth**: No authentication required (**Guest** access). <br>⚙️ **Config**: Only requires the vulnerable module version to be installed. Easy to trigger remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

📜 **Public Exp**: **YES**. <br>🔍 **PoC**: Available via **ProjectDiscovery Nuclei Templates** (CVE-2023-46347.yaml). <br>🌐 **Wild Exp**: Likely exploitable given the public PoC and low barrier to entry.

Q7How to self-check? (Features/Scanning)

🔍 **Self-Check**: <br>1. Scan for `ndk_steppingpack` module version ≤ 1.5.6. <br>2. Use Nuclei template `CVE-2023-46347.yaml` for automated detection. <br>3.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update the `ndk_steppingpack` module to a version **greater than 1.5.6**. <br>📢 **Source**: Official advisory from **Friends of Presta** (Oct 24, 2023) confirms the vulnerability and likely fix availability.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>1. **Disable/Remove** the `ndk_steppingpack` module immediately. <br>2. **WAF Rules**: Block SQL injection patterns targeting the `getPacks` endpoint. <br>3.…

Q10Is it urgent? (Priority Suggestion)

🔥 **Urgency**: **HIGH**. <br>⚡ **Reason**: Unauthenticated SQL Injection is critical. Public PoC exists. Immediate patching or module removal is recommended to prevent data breaches.