First published: Mon Nov 19 2018(Updated: )
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfiles), order (for upload destinations under modules/files), or cart (for upload destinations under modules/cartfiles).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Prestashop Prestashop | >=1.5.0.0<=1.7.0.0 | |
Mypresta Customer Files Upload | =2018-08-01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-19355 is critical with a CVSS score of 9.8.
The affected software for CVE-2018-19355 is PrestaShop versions 1.5 through 1.7 and the Customer Files Upload addon 2018-08-01 for PrestaShop.
Remote attackers can exploit CVE-2018-19355 by uploading a php file via modules/orderfiles/ajax/upload.php or modules/orderfiles/upload.php with auptype equal to product.
Yes, a fix is available for CVE-2018-19355. It is recommended to update to the latest version of the Customer Files Upload addon and apply any available patches or security updates from PrestaShop.
More information about CVE-2018-19355 can be found at the following link: [https://ia-informatica.com/it/CVE-2018-19355](https://ia-informatica.com/it/CVE-2018-19355)