In the module “Product Tag Icons Pro” (ticons) up to version 1.8.4 from My Presta.eu for PrestaShop, a guest can perform SQL injection in affected versions.

Summary

  • CVE ID: CVE-2023-46353
  • Published at: 2023-11-28
  • Platform: PrestaShop
  • Product: ticons
  • Impacted release: <= 1.8.3 (1.8.4 fixed the vulnerability)
  • Product author: MyPresta.eu
  • Weakness: CWE-89
  • Severity: critical (9.8)

Description

The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.

CVSS base metrics

  • Attack vector: network
  • Attack complexity: low
  • Privilege required: none
  • User interaction: none
  • Scope: unchanged
  • Confidentiality: high
  • Integrity: high
  • Availability: high

Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Possible malicious usage

  • Obtain admin access
  • Remove data from the associated PrestaShop
  • Copy/paste data from sensitive tables to FRONT to expose tokens and unlock admins’s ajax scripts
  • Rewrite SMTP settings to hijack emails

Patch from 1.8.3

--- 1.8.3/modules/ticons/models/TiconProduct.php
+++ 1.8.4/modules/ticons/models/TiconProduct.php
...
        LEFT JOIN `' . _DB_PREFIX_ . 'ticon` c ON (a.`id_ticon` = c.`id_ticon`)
-       LEFT JOIN `' . _DB_PREFIX_ . 'product_lang` b ON (b.`id_product` = a.`id_product` AND b.`id_lang` = ' . (int)Context::getContext()->language->id . ') WHERE a.id_product ="' . $id_product . '" ' . Shop::addSqlRestriction(false, 'b') . ' AND a.id_ticon="' . $id_ticon . '"');
+       LEFT JOIN `' . _DB_PREFIX_ . 'product_lang` b ON (b.`id_product` = a.`id_product` AND b.`id_lang` = ' . (int)Context::getContext()->language->id . ') WHERE a.id_product ="' . (int) $id_product . '" ' . Shop::addSqlRestriction(false, 'b') . ' AND a.id_ticon="' . (int) $id_ticon . '"');
    }

Other recommendations

  • It’s recommended to upgrade to the latest version of the module ticons.
  • Upgrade PrestaShop to the latest version to disable multiquery executions (separated by “;”) - be warned that this functionality WILL NOT protect your SHOP against injection SQL which uses the UNION clause to steal data.
  • Change the default database prefix ps_ with a new longer, arbitrary prefix. Nevertheless, be warned that this is useless against blackhats with DBA senior skill because of a design vulnerability in DBMS
  • Activate OWASP 942’s rules on your WAF (Web application firewall), be warned that you will probably break your backoffice and you will need to pre-configure some bypasses against this set of rules.

Timeline

Date Action
2023-08-02 Issue discovered during a code review by TouchWeb.fr
2023-08-02 Contact Author
2023-09-25 Author provide a patch
2023-10-17 Request a CVE ID
2023-10-23 Received CVE ID
2023-11-28 Publish this security advisory