An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with the POST parameter file_name in the tshirtecommerce/ajax.php?type=svg endpoint, to allow a remote attacker to traverse directories on the system in order to open files (without restriction on the extension and path). Only files that can be parsed in XML can be opened. This is exploited in the wild in March 2023.
References
Link | Resource |
---|---|
https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-06-01T00:00:00
Updated: 2023-06-01T00:00:00
Reserved: 2023-03-05T00:00:00
Link: CVE-2023-27639
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-06-01T21:15:09.260
Modified: 2023-06-09T15:48:23.720
Link: CVE-2023-27639
JSON object: View
Redhat Information
No data.
CWE