Moderate severityNVD Advisory· Published Aug 7, 2023· Updated Oct 3, 2024
PrestaShop vulnerable to file reading through path traversal
CVE-2023-39528
Description
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the displayAjaxEmailHTML method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
prestashop/prestashopPackagist | < 8.1.1 | 8.1.1 |
Affected products
1- Range: < 8.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-hpf4-v7v2-95p2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-39528ghsaADVISORY
- github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724cghsax_refsource_MISCWEB
- github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hpf4-v7v2-95p2ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.