Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hpf4-v7v2-95p2

Опубликовано: 09 авг. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.8

Описание

PrestaShop file access through path traversal

Impact

displayAjaxEmailHTML method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured.

This vulnerability can be exacerbated when coupled with CWE-502, which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability

Patches

8.1.1

Found by

Aleksey Solovev (Positive Technologies)

Workarounds

References

Пакеты

Наименование

prestashop/prestashop

composer
Затронутые версииВерсия исправления

<= 8.1.0

8.1.1

EPSS

Процентиль: 69%
0.006
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 6.8
nvd
больше 2 лет назад

PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds.

EPSS

Процентиль: 69%
0.006
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-22