
CVE-2023-47109 – PrestaShop blockreassurance BO User can remove any file from server when adding a and deleting a block
https://notcve.org/view.php?id=CVE-2023-47109
08 Nov 2023 — PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4. • https://github.com/PrestaShop/blockreassurance/commit/2d0e97bebf795690caffe33c1ab23a9bf43fcdfa • CWE-285: Improper Authorization •

CVE-2023-36263
https://notcve.org/view.php?id=CVE-2023-36263
31 Oct 2023 — Prestashop opartlimitquantity 1.4.5 and before is vulnerable to SQL Injection. OpartlimitquantityAlertlimitModuleFrontController::displayAjaxPushAlertMessage()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection. Prestashop opartlimitquantity 1.4.5 y anteriores es vulnerable a la inyección SQL. OpartlimitquantityAlertlimitModuleFrontController::displayAjaxPushAlertMessage()` tiene llamadas SQL sensibles que pueden ejecutarse con una llamada http triv... • https://security.friendsofpresta.org/modules/2023/10/25/opartlimitquantity.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-43664 – Employee without any access rights can list all installed modules in Prestashop
https://notcve.org/view.php?id=CVE-2023-43664
28 Sep 2023 — PrestaShop is an Open Source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method `ajaxProcessGetPossibleHookingListForModule` doesn't check access rights. This issue has been addressed in commit `15bd281c` which is included in version 8.1.2. Users are advised to upgrade. There are no known workaround for this issue. • https://github.com/PrestaShop/PrestaShop/commit/15bd281c18f032a5134a8d213b44d24829d45762 • CWE-269: Improper Privilege Management •

CVE-2023-43663 – Improper Privilege Management in Prestashop
https://notcve.org/view.php?id=CVE-2023-43663
28 Sep 2023 — PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. • https://github.com/PrestaShop/PrestaShop/commit/ce1f67083537194e974caf86c57e547a0aaa46cd • CWE-269: Improper Privilege Management •

CVE-2022-45448 – Cross-site Scripting in M4 PDF plugin for Prestashop sites
https://notcve.org/view.php?id=CVE-2022-45448
20 Sep 2023 — M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to an arbitrary HTML Document crafting vulnerability. The resource /m4pdf/pdf.php uses templates to dynamically create documents. In the case that the template does not exist, the application will return a fixed document with a message in mpdf format. An attacker could exploit this vulnerability by inputting a valid HTML/CSS document as the value of the parameter. El complemento M4 PDF para sitios Prestashop, en su versión 3.... • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-m4-pdf-plugin-prestashop-sites • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-45447 – Path Traversal in M4 PDF plugin for Prestashop sites
https://notcve.org/view.php?id=CVE-2022-45447
20 Sep 2023 — M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to a directory traversal vulnerability. The “f” parameter is not properly checked in the resource /m4pdf/pdf.php, returning any file given its relative path. An attacker that exploits this vulnerability could download /etc/passwd from the server if the file exists. El complemento M4 PDF para sitios Prestashop, en su versión 3.2.3 y anteriores, es vulnerable a una vulnerabilidad de Directory Traversal. El parámetro “f” no está... • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-m4-pdf-plugin-prestashop-sites • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-39530 – PrestaShop vulnerable to file deletion via CustomerMessage
https://notcve.org/view.php?id=CVE-2023-39530
07 Aug 2023 — PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete files from the server via the CustomerMessage API. Version 8.1.1 contains a patch for this issue. There are no known workarounds. PrestaShop es una aplicación web de comercio electrónico de código abierto. • https://github.com/PrestaShop/PrestaShop/commit/6ce750b2367a7309b6bf50166f1873cb86ad57e9 • CWE-20: Improper Input Validation •

CVE-2023-39529 – PrestaShop vulnerable to file deletion via attachment API
https://notcve.org/view.php?id=CVE-2023-39529
07 Aug 2023 — PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete a file from the server by using the Attachments controller and the Attachments API. Version 8.1.1 contains a patch for this issue. There are no known workarounds. • https://github.com/PrestaShop/PrestaShop/commit/b08c647305dc1e9e6a2445b724d13a9733b6ed82 • CWE-20: Improper Input Validation •

CVE-2023-39528 – PrestaShop vulnerable to file reading through path traversal
https://notcve.org/view.php?id=CVE-2023-39528
07 Aug 2023 — PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds. PrestaShop es una aplicación web de comercio electrónico de código abierto. • https://github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724c • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-39527 – PrestaShop XSS vulnerability through Validate::isCleanHTML method
https://notcve.org/view.php?id=CVE-2023-39527
07 Aug 2023 — PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to cross-site scripting through the `isCleanHTML` method. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds. PrestaShop es una aplicación web de comercio electrónico de código abierto. • https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-116: Improper Encoding or Escaping of Output •