{"id":15788,"date":"2022-08-04T09:48:07","date_gmt":"2022-08-04T07:48:07","guid":{"rendered":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerabilidad-seguridad-1\/"},"modified":"2024-08-23T14:44:24","modified_gmt":"2024-08-23T12:44:24","slug":"prestashop-vulnerability","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/prestashop-vulnerability\/","title":{"rendered":"PrestaShop: security vulnerability"},"content":{"rendered":"<p><a href=\"https:\/\/www.prestashop.com\/\"><span style=\"font-weight: 400;\">PrestaShop<\/span><\/a><span style=\"font-weight: 400;\">, the company that gives name to the famous CMS (content management system) in open source, has reported a vulnerability in the safety of their product, that allowed the execution of arbitrary code on the servers that give support to websites based on it. In scenarios like this, a next generation WAF becomes highly important. Let us explain.\u00a0<\/span><\/p>\n<h2><b>PRESTASHOP: VULNERABILITY DUE TO AN SQL INJECTION<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">INJECTING MALICIOUS CODE<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">PrestaShop\u2019s CMS is a solution preferred by a large number of people in the construction of their e-commerce platforms. According to the company itself, approximately 300.000 online businesses are based on their software solution, especially in Europe and Latin America.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The exploitation of this vulnerability and the subsequent injection of malicious code will give the attacker the ability of gathering confidential information referring to the clients of these e-commerce platforms. This information includes banking details of said clients.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The vulnerability, which has been categorized as <\/span><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-36408\"><span style=\"font-weight: 400;\">CVE-2022-36408<\/span><\/a><span style=\"font-weight: 400;\">, is a vulnerability by SQL injection or SQLi. According to the data given by the company, it affects versions of their product from v1.6.0.10 onwards. PrestaShop has repaired it from version v1.7.8.7, although they can\u2019t guarantee that this is the only way of executing the attack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And, even if you do have to<\/span> <a href=\"https:\/\/prestashop.com\/prestashop-edition-basic\/\"><span style=\"font-weight: 400;\">update the software<\/span><\/a><span style=\"font-weight: 400;\">, with its corresponding security patches, such as we recommend at Transparent Edge, it\u2019s also useful to consider the great relevance of a WAF (<\/span><span style=\"font-weight: 400;\">web application firewall<\/span><span style=\"font-weight: 400;\">).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">WAF AGAINST MALICIOUS TRAFFIC<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A WAF is, first of all, a security tool, a firewall that analyzes and, when necessary, intercepts and blocks malicious HTTP traffic (such as attempts of SQLi and others), to and from a web application, such as the case of an e-commerce platform based on PrestaShop.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Integrated into our next-generation CDN, our WAF is completely configurable from our dashboard.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Declaratively, and through a limited set of<\/span> <a href=\"https:\/\/docs.transparentedge.eu\/security\/waf\"><span style=\"font-weight: 400;\">HTTP headers<\/span><\/a><span style=\"font-weight: 400;\">, it\u2019s possible, among other things:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Activate or deactivate the WAF according to the necessary criteria for each scenario: geographical, based on user cookies, URLs, etc.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Indicate the operating way of the WAF (detection and blocking, or only detection, to carry out a preliminary analysis of the received traffic)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Apply exceptions to the rules for the cases in which it\u2019s justified and required (for example, when facing false positives), etc.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">That way, a configuration such as the next, deployed in our panel, would activate the use of the WAF for the website www.mysite.com\u00a0<\/span><\/p>\n<pre><span style=\"font-weight: 400;\">sub vcl_recv {<\/span>\n\n<span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0if (req.http.host == \"www.mi-sitio.es\") {<\/span>\n\n<span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0set req.http.TCDN-WAF-Enabled = \"true\";<\/span>\n\n<span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0set req.http.TCDN-WAF-Set-SecRuleEngine = \"#On\";<\/span>\n\n<span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0}<\/span>\n\n<span style=\"font-weight: 400;\">}<\/span><\/pre>\n<p><span style=\"font-weight: 400;\">That way, the requests made against the website would be processed in our<\/span> <a href=\"https:\/\/www.transparentedge.eu\/blog\/una-cdn-aumenta-la-ciberresiliencia\/\"><span style=\"font-weight: 400;\">CDN<\/span><\/a><span style=\"font-weight: 400;\">, which would delegate those requests to the WAF.\u00a0 The WAF would then act as a second layer between the CDN and the origin (backend) of the site.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">INNOCUOUS OR MALICIOUS REQUESTS<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Once a request is received in the WAF, it executes the proper verifications to determine its nature: whether it&#8217;s safe or malicious.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, in the case it\u2019s safe, the request will be delegated safely to the origin, the underlying infrastructure. But if the request is malicious, it will be blocked by the WAF, returning a status code 403 (Forbidden). It will never get to interact with the origin, so it won\u2019t be able to cause harm.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Transparent Edge\u2019s next-generation WAF is built on Modsecurity and implements and updates the OWASP <\/span><span style=\"font-weight: 400;\">(Open Web Application Security Project)<\/span><span style=\"font-weight: 400;\"> CRS (<\/span><span style=\"font-weight: 400;\">core rule set<\/span><span style=\"font-weight: 400;\">) so that it can always have the latest set of rules for attack detection.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The goal is then, to protect web applications from a wide variety of attacks, including the OWASP Top 10, and on the other hand, minimize the possibility of false positives.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">PRESTASHOP: SQLI VULNERABILITY<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In the case of the vulnerability reported by PrestaShop, being an SQLi, the set of rules of OWASP CRS associated with this kind of attacks is the one with numbering\u00a0 942XXX. It\u2019s related to configuration file rules: <\/span><a href=\"https:\/\/github.com\/coreruleset\/coreruleset\/blob\/v4.0\/dev\/rules\/REQUEST-942-APPLICATION-ATTACK-SQLI.conf\"><span style=\"font-weight: 400;\">rules\/REQUEST-942-APPLICATION-ATTACK-SQLI.conf<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This set of rules combines the different reasons contemplated (in broad terms, matching regular expressions), that reveal that a matching request has the purpose to access the website\u2019s database, maybe to destroy or to gather data, as it has happened with PrestaShop.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">NEXT-GENERATION WAF<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Our next-generation WAF has, besides, an integrated antivirus for the analysis of attached files. It guarantees the access to security audits generated by said WAF, from our control dashboard or as an external way through our log delivery service via streaming.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, and thanks to its integration with our CDN, it\u2019s possible to combine in a simple way other mechanisms for protection, such as blocking of suspicious IPs, defining geolocation blocking rules, or applying limits to the ratio of requests by unit of time <\/span><i><span style=\"font-weight: 400;\">(rate limit).\u00a0<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">To summarize, having an adequate policy for the installation of security patches and the update of software is key. You\u2019ve seen that our WAF is a tool with the proper attributes and required capacity to counteract and mitigate dangerous scenarios, such as the one that PrestaShop detected recently. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PrestaShop, the company that gives name to the famous CMS (content management system) in open source, has reported a vulnerability [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":15931,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[137],"tags":[138,139,140,141],"class_list":["post-15788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-optimizacion-en","tag-alto-rendimiento-en","tag-cdn-en","tag-distribucion-de-contenidos-en","tag-edgecomputing-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PrestaShop: security vulnerability - Transparent Edge<\/title>\n<meta name=\"description\" content=\"This is how our next-generation WAF can cope with a vulnerability like the one announced by PrestaShop recently.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PrestaShop: security vulnerability - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"This is how our next-generation WAF can cope with a vulnerability like the one announced by PrestaShop recently.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-04T07:48:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-23T12:44:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jara Exp\u00f3sito\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"PrestaShop: vulnerabilidad de seguridad\" \/>\n<meta name=\"twitter:description\" content=\"Abordamos c\u00f3mo nuestro WAF de nueva generaci\u00f3n puede hacer frente a una vulnerabilidad como la anunciada por PrestaShop.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-ii-e1659603344632.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/\"},\"author\":{\"name\":\"Jara Exp\u00f3sito\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/e2bd1cb076dea3d14dfdad4191c83f1a\"},\"headline\":\"PrestaShop: security vulnerability\",\"datePublished\":\"2022-08-04T07:48:07+00:00\",\"dateModified\":\"2024-08-23T12:44:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/\"},\"wordCount\":826,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/prestashop-vulnerabilidad-2-1.png\",\"keywords\":[\"alto rendimiento\",\"CDN\",\"distribuci\u00f3n de contenidos\",\"EdgeComputing\"],\"articleSection\":[\"optimizaci\u00f3n\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/\",\"name\":\"PrestaShop: security vulnerability - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/prestashop-vulnerabilidad-2-1.png\",\"datePublished\":\"2022-08-04T07:48:07+00:00\",\"dateModified\":\"2024-08-23T12:44:24+00:00\",\"description\":\"This is how our next-generation WAF can cope with a vulnerability like the one announced by PrestaShop recently.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/prestashop-vulnerabilidad-2-1.png\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/prestashop-vulnerabilidad-2-1.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/prestashop-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PrestaShop: security vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/e2bd1cb076dea3d14dfdad4191c83f1a\",\"name\":\"Jara Exp\u00f3sito\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PrestaShop: security vulnerability - Transparent Edge","description":"This is how our next-generation WAF can cope with a vulnerability like the one announced by PrestaShop recently.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"PrestaShop: security vulnerability - Transparent Edge","og_description":"This is how our next-generation WAF can cope with a vulnerability like the one announced by PrestaShop recently.","og_url":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/","og_site_name":"Transparent Edge","article_published_time":"2022-08-04T07:48:07+00:00","article_modified_time":"2024-08-23T12:44:24+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-2-1.png","type":"image\/png"}],"author":"Jara Exp\u00f3sito","twitter_card":"summary_large_image","twitter_title":"PrestaShop: vulnerabilidad de seguridad","twitter_description":"Abordamos c\u00f3mo nuestro WAF de nueva generaci\u00f3n puede hacer frente a una vulnerabilidad como la anunciada por PrestaShop.","twitter_image":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-ii-e1659603344632.jpg","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/"},"author":{"name":"Jara Exp\u00f3sito","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/e2bd1cb076dea3d14dfdad4191c83f1a"},"headline":"PrestaShop: security vulnerability","datePublished":"2022-08-04T07:48:07+00:00","dateModified":"2024-08-23T12:44:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/"},"wordCount":826,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-2-1.png","keywords":["alto rendimiento","CDN","distribuci\u00f3n de contenidos","EdgeComputing"],"articleSection":["optimizaci\u00f3n"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/","url":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/","name":"PrestaShop: security vulnerability - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-2-1.png","datePublished":"2022-08-04T07:48:07+00:00","dateModified":"2024-08-23T12:44:24+00:00","description":"This is how our next-generation WAF can cope with a vulnerability like the one announced by PrestaShop recently.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-2-1.png","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/08\/prestashop-vulnerabilidad-2-1.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/blog\/prestashop-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"PrestaShop: security vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/e2bd1cb076dea3d14dfdad4191c83f1a","name":"Jara Exp\u00f3sito"}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=15788"}],"version-history":[{"count":2,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15788\/revisions"}],"predecessor-version":[{"id":19686,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15788\/revisions\/19686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/15931"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=15788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=15788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=15788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}