Описание
PrestaShop file access through path traversal
Impact
displayAjaxEmailHTML method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured.
This vulnerability can be exacerbated when coupled with CWE-502, which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability
Patches
8.1.1
Found by
Aleksey Solovev (Positive Technologies)
Workarounds
References
Пакеты
prestashop/prestashop
<= 8.1.0
8.1.1
Связанные уязвимости
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds.