This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Path Traversal in PrestaShop's **tshirtecommerce** module. <br>π₯ **Consequences**: Attackers can bypass file extension/path restrictions to read arbitrary system files via crafted GET requests.β¦
π‘οΈ **Root Cause**: **CWE-22 (Path Traversal)**. The `tshirtecommerce/fonts.php` endpoint fails to sanitize **GET parameters**, allowing directory traversal sequences (`../`) to escape the intended directory.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: **PrestaShop** users running the **tshirtecommerce** (Custom Product Designer) module. <br>π **Version**: Version **2.1.4 and earlier**. Check your module version immediately!
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Capabilities**: <br>1οΈβ£ **Directory Traversal**: Navigate outside the web root. <br>2οΈβ£ **File Disclosure**: View contents of code files, configs, or sensitive data.β¦
π» **Public Exp?**: **YES**. <br>π **PoC**: Available via **ProjectDiscovery Nuclei** templates. <br>π **Wild Exp**: High risk of automated scanning. Attackers can use existing tools to probe for this flaw easily.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1οΈβ£ **Scan**: Use Nuclei or similar scanners with CVE-2023-27639 templates. <br>2οΈβ£ **Manual**: Send crafted GET requests to `/modules/tshirtecommerce/fonts.php` with `../` payloads.β¦
π§ **No Patch Workaround**: <br>1οΈβ£ **Disable**: Uninstall or disable the **tshirtecommerce** module if not in use. <br>2οΈβ£ **WAF**: Block requests containing `../` or specific GET parameters targeting `fonts.php`.β¦