{"api_version":"1","generated_at":"2026-04-22T17:48:24+00:00","cve":"CVE-2023-47109","urls":{"html":"https://cve.report/CVE-2023-47109","api":"https://cve.report/api/cve/CVE-2023-47109.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-47109","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-47109"},"summary":{"title":"CVE-2023-47109","description":"PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-11-08 22:15:00","updated_at":"2023-11-16 17:34:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/PrestaShop/blockreassurance/commit/eec00da564db4c1804b0a0d1e3d9f7ec4e27d823","name":"https://github.com/PrestaShop/blockreassurance/commit/eec00da564db4c1804b0a0d1e3d9f7ec4e27d823","refsource":"","tags":[],"title":"Merge pull request #619 from matthieu-rolland/add-security-fixes · PrestaShop/blockreassurance@eec00da · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/PrestaShop/blockreassurance/security/advisories/GHSA-83j2-qhx2-p7jc","name":"https://github.com/PrestaShop/blockreassurance/security/advisories/GHSA-83j2-qhx2-p7jc","refsource":"","tags":[],"title":"BO User can remove any file from server when adding a and deleting a block · Advisory · PrestaShop/blockreassurance · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/PrestaShop/blockreassurance/releases/tag/v5.1.4","name":"https://github.com/PrestaShop/blockreassurance/releases/tag/v5.1.4","refsource":"","tags":[],"title":"Release v5.1.4 · PrestaShop/blockreassurance · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/PrestaShop/blockreassurance/commit/2d0e97bebf795690caffe33c1ab23a9bf43fcdfa","name":"https://github.com/PrestaShop/blockreassurance/commit/2d0e97bebf795690caffe33c1ab23a9bf43fcdfa","refsource":"","tags":[],"title":"Merge pull request from GHSA-83j2-qhx2-p7jc · PrestaShop/blockreassurance@2d0e97b · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-47109","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-47109","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"47109","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"prestashop","cpe5":"customer_reassurance_block","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"prestashop","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-47109","qid":"995848","title":"PHP (Composer) Security Update for prestashop/blockreassurance (GHSA-83j2-qhx2-p7jc)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-47109","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4.\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-285: Improper Authorization","cweId":"CWE-285"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"PrestaShop","product":{"product_data":[{"product_name":"blockreassurance","version":{"version_data":[{"version_affected":"=","version_value":"<= 5.1.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/PrestaShop/blockreassurance/security/advisories/GHSA-83j2-qhx2-p7jc","refsource":"MISC","name":"https://github.com/PrestaShop/blockreassurance/security/advisories/GHSA-83j2-qhx2-p7jc"},{"url":"https://github.com/PrestaShop/blockreassurance/commit/2d0e97bebf795690caffe33c1ab23a9bf43fcdfa","refsource":"MISC","name":"https://github.com/PrestaShop/blockreassurance/commit/2d0e97bebf795690caffe33c1ab23a9bf43fcdfa"},{"url":"https://github.com/PrestaShop/blockreassurance/commit/eec00da564db4c1804b0a0d1e3d9f7ec4e27d823","refsource":"MISC","name":"https://github.com/PrestaShop/blockreassurance/commit/eec00da564db4c1804b0a0d1e3d9f7ec4e27d823"},{"url":"https://github.com/PrestaShop/blockreassurance/releases/tag/v5.1.4","refsource":"MISC","name":"https://github.com/PrestaShop/blockreassurance/releases/tag/v5.1.4"}]},"source":{"advisory":"GHSA-83j2-qhx2-p7jc","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-11-08 22:15:00","lastModifiedDate":"2023-11-16 17:34:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:prestashop:customer_reassurance_block:*:*:*:*:*:prestashop:*:*","versionEndExcluding":"5.1.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}