CVE-2018-10942

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to upload malicious .phtml files containing PHP code through the Attribute Wizard addon for PrestaShop. Successful exploitation leads to arbitrary code execution on the web server. All PrestaShop installations using the vulnerable Attribute Wizard addon version are affected.

💻 Affected Systems

Products:
  • PrestaShop with Attribute Wizard addon
Versions: PrestaShop 1.4.0.1 through 1.6.1.18 with Attribute Wizard addon 1.6.9
Operating Systems: Any OS running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Attribute Wizard addon to be installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to execute arbitrary commands, steal data, install backdoors, or pivot to internal networks.

🟠

Likely Case

Webshell installation leading to data theft, defacement, or use as part of a botnet.

🟢

If Mitigated

Attack blocked at web application firewall or file upload validation layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload exploitation with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Attribute Wizard addon version after 1.6.9

Vendor Advisory: https://ia-informatica.com/it/CVE-2018-10942

Restart Required: No

Instructions:

1. Update Attribute Wizard addon to latest version. 2. Update PrestaShop to latest version. 3. Remove any uploaded .phtml files from server.

🔧 Temporary Workarounds

Block .phtml file uploads

all

Configure web server or application to reject .phtml file uploads

# In .htaccess for Apache: 
<FilesMatch "\.phtml$">
    Order Allow,Deny
    Deny from all
</FilesMatch>
# In nginx config:
location ~ \.phtml$ {
    deny all;
}

Disable Attribute Wizard addon

linux

Temporarily disable the vulnerable module

# Rename or move the vulnerable file:
mv modules/attributewizardpro/file_upload.php modules/attributewizardpro/file_upload.php.disabled

🧯 If You Can't Patch

  • Implement strict file upload validation allowing only specific file types
  • Deploy web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check if file exists: modules/attributewizardpro/file_upload.php and verify PrestaShop/Attribute Wizard versions match vulnerable range.

Check Version:

Check PrestaShop version in config/settings.inc.php and Attribute Wizard version in module directory.

Verify Fix Applied:

Confirm file_upload.php no longer accepts .phtml files or has been removed/renamed.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /modules/attributewizardpro/file_upload.php
  • File uploads with .phtml extension
  • Unusual PHP execution in upload directories

Network Indicators:

  • HTTP requests uploading files to the vulnerable endpoint
  • Subsequent connections from webshells

SIEM Query:

source="web_logs" AND uri="/modules/attributewizardpro/file_upload.php" AND method="POST"

🔗 References

📤 Share & Export