CVE-2023-27569

9.8 CRITICAL

📋 TL;DR

CVE-2023-27569 is a critical SQL injection vulnerability in the eo_tags module for PrestaShop that allows attackers to execute arbitrary SQL commands via manipulated HTTP User-Agent or Referer headers. This affects all PrestaShop installations using vulnerable versions of the eo_tags package. Successful exploitation could lead to complete database compromise.

💻 Affected Systems

Products:
  • PrestaShop eo_tags module
Versions: All versions before 1.3.0
Operating Systems: All platforms running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PrestaShop installations with the eo_tags module installed. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise including sensitive data theft, privilege escalation, and complete system takeover through SQL injection leading to remote code execution.

🟠

Likely Case

Database information disclosure, data manipulation, and potential administrative access to the PrestaShop backend.

🟢

If Mitigated

Limited impact with proper input validation and WAF rules blocking suspicious SQL patterns in headers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and can be performed via simple HTTP requests with malicious headers. Public exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.0

Vendor Advisory: https://security.profileo.com/cve/eo_tags_2023-27569-27570/

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules > Module Manager. 3. Search for 'eo_tags' module. 4. Click 'Upgrade' to version 1.3.0. 5. Alternatively, download version 1.3.0 from the PrestaShop Addons marketplace and manually install.

🔧 Temporary Workarounds

Disable eo_tags module

all

Temporarily disable the vulnerable module until patching is possible

Navigate to PrestaShop admin > Modules > Module Manager > eo_tags > Disable

WAF rule for SQL injection in headers

all

Implement web application firewall rules to block SQL injection patterns in User-Agent and Referer headers

Add WAF rule: Detect and block SQL keywords (SELECT, UNION, INSERT, etc.) in User-Agent and Referer headers

🧯 If You Can't Patch

  • Implement strict input validation to sanitize User-Agent and Referer headers before processing
  • Deploy a web application firewall with SQL injection protection rules specifically for header fields

🔍 How to Verify

Check if Vulnerable:

Check eo_tags module version in PrestaShop admin panel under Modules > Module Manager. If version is below 1.3.0, the system is vulnerable.

Check Version:

In PrestaShop admin: Modules > Module Manager > Search 'eo_tags' > Check version number

Verify Fix Applied:

Confirm eo_tags module version is 1.3.0 or higher in the module manager. Test with security scanning tools that check for SQL injection vulnerabilities.

📡 Detection & Monitoring

Log Indicators:

  • Unusually long User-Agent or Referer headers containing SQL keywords
  • Multiple failed SQL queries from same IP with suspicious header patterns
  • Database error logs showing SQL syntax errors from web requests

Network Indicators:

  • HTTP requests with SQL injection payloads in User-Agent or Referer headers
  • Abnormal database query patterns originating from web server

SIEM Query:

source="web_logs" AND (User-Agent CONTAINS "SELECT" OR Referer CONTAINS "UNION" OR User-Agent CONTAINS "INSERT" OR Referer CONTAINS "DELETE")

🔗 References

📤 Share & Export