CVE-2019-19594

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to upload and execute arbitrary PHP files through the Adobe Stock API Integration module in PrestaShop. Attackers can achieve remote code execution on affected servers, potentially compromising the entire e-commerce platform. All PrestaShop installations using the vulnerable RESET.PRO Adobe Stock API Integration module are affected.

💻 Affected Systems

Products:
  • RESET.PRO Adobe Stock API Integration for PrestaShop
Versions: All versions used with PrestaShop 1.6 and 1.7
Operating Systems: Any OS running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable module to be installed and enabled in PrestaShop.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to steal customer data, install backdoors, deface websites, or use the server for further attacks.

🟠

Likely Case

Website defacement, data theft, or installation of cryptocurrency miners or malware on the server.

🟢

If Mitigated

Attack prevented at the web application firewall level or through proper file upload validation.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable remotely without authentication via web requests.
🏢 Internal Only: LOW - The attack vector is through web interfaces typically exposed to the internet.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload vulnerability requiring only HTTP POST requests with malicious PHP files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version of RESET.PRO Adobe Stock API Integration module

Vendor Advisory: https://ia-informatica.com/it/CVE-2019-19594

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules section. 3. Find 'Adobe Stock API Integration' module. 4. Check for updates or reinstall latest version. 5. Alternatively, disable the module if not needed.

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the RESET.PRO Adobe Stock API Integration module

Restrict file uploads

linux

Configure web server to block .php file uploads to the vulnerable path

# Apache: Add to .htaccess
<FilesMatch "\.php$">
    Order Allow,Deny
    Deny from all
</FilesMatch>

# Nginx: Add to server block
location ~* /reset/modules/fotoliaFoto/multi_upload\.php {
    deny all;
}

🧯 If You Can't Patch

  • Disable the RESET.PRO Adobe Stock API Integration module completely
  • Implement WAF rules to block requests to /reset/modules/fotoliaFoto/multi_upload.php

🔍 How to Verify

Check if Vulnerable:

Check if file exists: /reset/modules/fotoliaFoto/multi_upload.php in PrestaShop installation directory

Check Version:

Check module version in PrestaShop admin panel under Modules section

Verify Fix Applied:

Verify module is updated to latest version or disabled in PrestaShop admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /reset/modules/fotoliaFoto/multi_upload.php
  • File uploads with .php extension to the vulnerable path
  • Unusual file creation in web directories

Network Indicators:

  • POST requests to the vulnerable endpoint with file uploads
  • Traffic patterns showing file uploads to unexpected paths

SIEM Query:

source="web_server" AND (uri="/reset/modules/fotoliaFoto/multi_upload.php" OR file_extension="php")

🔗 References

📤 Share & Export