First published: Mon Aug 07 2023(Updated: )
### Impact `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. This vulnerability can be exacerbated when coupled with [CWE-502](https://cwe.mitre.org/data/definitions/502.html), which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds ### References
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prestashop Prestashop | <8.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39528 is a vulnerability in PrestaShop, an open source e-commerce web application, that allows for unauthorized file access.
The impact of CVE-2023-39528 is that it allows an attacker to read any file on the server, potentially even outside of the project if the server is not correctly configured.
CVE-2023-39528 can be exploited by using the `displayAjaxEmailHTML` method in PrestaShop to read files on the server.
CVE-2023-39528 has a severity score of 8.6, which is considered high.
To fix CVE-2023-39528, upgrade to version 8.1.1 of PrestaShop.