PrestaShop file access through path traversal
Moderate severity
GitHub Reviewed
Published
Aug 7, 2023
in
PrestaShop/PrestaShop
•
Updated Nov 6, 2023
Description
Published by the National Vulnerability Database
Aug 7, 2023
Published to the GitHub Advisory Database
Aug 9, 2023
Reviewed
Aug 9, 2023
Last updated
Nov 6, 2023
Impact
displayAjaxEmailHTML
method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured.This vulnerability can be exacerbated when coupled with CWE-502, which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability
Patches
8.1.1
Found by
Aleksey Solovev (Positive Technologies)
Workarounds
References
References