{"vulnerability": "CVE-2024-21627", "sightings": [{"uuid": "20d81416-0f8a-41a2-8dcd-f220deef659c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21627", "type": "seen", "source": "https://t.me/ctinow/171833", "content": "https://ift.tt/t4xMLbF\nCVE-2024-21627 | PrestaShop isCleanHTML cross site scripting (GHSA-xgpm-q3mq-46rq)", "creation_timestamp": "2024-01-23T10:26:59.000000Z"}, {"uuid": "f86995f8-2f7f-4ca6-9427-3a3aa2d1d2f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21627", "type": "seen", "source": "https://t.me/cibsecurity/74204", "content": "\u203c\ufe0fCVE-2024-21627\u203c\ufe0f\n\nPrestaShop is an opensource ecommerce platform. Prior to versions 8.1.3 and 1.7.8.11, some event attributes are not detected by the isCleanHTML method. Some modules using the isCleanHTML method could be vulnerable to crosssite scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the HTMLPurifier library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of HTML type will call isCleanHTML.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:33.000000Z"}, {"uuid": "f64e03b6-071d-4d86-aca2-d87f92649568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21627", "type": "seen", "source": "https://t.me/ctinow/162058", "content": "https://ift.tt/IMx3gG1\nCVE-2024-21627", "creation_timestamp": "2024-01-02T22:26:55.000000Z"}]}