Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-83j2-qhx2-p7jc: PrestaShop blockreassurance BO User can remove any file from server when adding a and deleting a block

Impact

When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted.

It is possible to make the website completely unavailable by removing index.php for example.

Patches

v5.1.4

Workarounds

No workaround available

References

ghsa
#vulnerability#web#git#php

Skip to content

Sign up

CVE-2023-47109

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

Explore

*   All features
*   Documentation
*   GitHub Skills
*   Blog
  • For

    • Enterprise
    • Teams
    • Startups
    • Education

    By Solution

    • CI/CD & Automation
    • DevOps
    • DevSecOps

    Resources

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

Repositories

*   Topics
*   Trending
*   Collections
  • Pricing

Search code, repositories, users, issues, pull requests…

Provide feedback

We read every piece of feedback, and take your input very seriously.

Include my email address so I can be contacted

Saved searches****Use saved searches to filter your results more quickly

Sign in

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-47109

PrestaShop blockreassurance BO User can remove any file from server when adding a and deleting a block

Moderate severity GitHub Reviewed Published Nov 8, 2023 in PrestaShop/blockreassurance • Updated Nov 8, 2023

Vulnerability details Dependabot alerts 0

Package

composer prestashop/blockreassurance (Composer)

Affected versions

<= 5.1.3

Patched versions

5.1.4

Description

Impact

When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted.

It is possible to make the website completely unavailable by removing index.php for example.

Patches

v5.1.4

Workarounds

No workaround available

References****References

  • GHSA-83j2-qhx2-p7jc
  • PrestaShop/blockreassurance@2d0e97b
  • PrestaShop/blockreassurance@eec00da
  • https://github.com/PrestaShop/blockreassurance/releases/tag/v5.1.4

matthieu-rolland published to PrestaShop/blockreassurance

Nov 8, 2023

Published to the GitHub Advisory Database

Nov 8, 2023

Reviewed

Nov 8, 2023

Last updated

Nov 8, 2023

Severity

Moderate

5.5

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

High

User interaction

None

Scope

Unchanged

Confidentiality

Low

Integrity

None

Availability

High

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H

Weaknesses

No CWEs

CVE ID

CVE-2023-47109

GHSA ID

GHSA-83j2-qhx2-p7jc

Source code

PrestaShop/blockreassurance

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2023-47109: BO User can remove any file from server when adding a and deleting a block

PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4.