Lucene search

K
githubGitHub Advisory DatabaseGHSA-83J2-QHX2-P7JC
HistoryNov 08, 2023 - 5:53 p.m.

PrestaShop blockreassurance BO User can remove any file from server when adding a and deleting a block

2023-11-0817:53:14
CWE-285
GitHub Advisory Database
github.com
8
prestashop blockreassurance module
bo user
file manipulation
server vulnerability
website availability
security patch

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.1%

Impact

When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted.

It is possible to make the website completely unavailable by removing index.php for example.

Patches

v5.1.4

Workarounds

No workaround available

References

Affected configurations

Vulners
Node
prestashopcontactformRange5.1.3prestashop
CPENameOperatorVersion
prestashop/blockreassurancele5.1.3

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.1%

Related for GHSA-83J2-QHX2-P7JC