PrestaShop blockreassurance v5.1.4: Ajax Config Write Remote
CVE-2023-47110 Published on November 9, 2023
Any value can be changed in the configuration table by an employee having access to block reassurance module
blockreassurance adds an information block aimed at offering helpful information to reassure customers that their store is trustworthy. An ajax function in module blockreassurance allows modifying any value in the configuration table. This vulnerability has been patched in version 5.1.4.
Vulnerability Analysis
CVE-2023-47110 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2023-47110 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2023-47110
Want to know whenever a new CVE is published for PrestaShop Customer Reassurance Block? stack.watch will email you.
Affected Versions
PrestaShop blockreassurance Version <= 5.1.3 is affected by CVE-2023-47110Vulnerable Packages
The following package name and versions may be associated with CVE-2023-47110
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| composer | prestashop/blockreassurance | <= 5.1.3 | 5.1.4 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.