CVE-2023-30200

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform path traversal attacks in the 'ultimateimagetool' PrestaShop module, enabling them to download sensitive personal information without authorization. It affects PrestaShop installations using the vulnerable module versions. Guest users can exploit this to access restricted files containing personal data.

💻 Affected Systems

Products:
  • Advanced Plugins for PrestaShop - Image: WebP, Compress, Zoom, Lazy load, Alt & More (ultimateimagetool)
Versions: Up to and including 2.1.02
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PrestaShop installations with the vulnerable module enabled. The vulnerability is present in the module's file handling functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all personal information stored on the server, including customer data, configuration files, and sensitive system files, potentially leading to data breaches and regulatory violations.

🟠

Likely Case

Unauthorized access to customer personal information, order details, and potentially administrative credentials stored in configuration files.

🟢

If Mitigated

Limited exposure of non-sensitive files if proper file permissions and web server configurations restrict access to critical directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is well-documented with public references showing the exact vulnerable code path. Attackers can craft simple HTTP requests to traverse directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.03 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/07/20/ultimateimagetool.html

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules > Module Manager. 3. Search for 'ultimateimagetool'. 4. Click 'Update' if available, or uninstall and install latest version from official marketplace. 5. Verify module version is 2.1.03 or higher.

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the ultimateimagetool module until patched

UPDATE ps_module SET active = 0 WHERE name = 'ultimateimagetool';

Restrict file access via web server

linux

Configure web server to block directory traversal attempts

# Apache: Set AllowOverride None in vulnerable directories
# Nginx: Add 'location ~ \.\./ { deny all; }' to config

🧯 If You Can't Patch

  • Disable the ultimateimagetool module completely
  • Implement WAF rules to block path traversal patterns in requests

🔍 How to Verify

Check if Vulnerable:

Check module version in PrestaShop admin panel under Modules > Module Manager > ultimateimagetool. If version is 2.1.02 or lower, you are vulnerable.

Check Version:

SELECT version FROM ps_module WHERE name = 'ultimateimagetool';

Verify Fix Applied:

Confirm module version is 2.1.03 or higher. Test by attempting path traversal requests to verify they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' patterns to the ultimateimagetool endpoint
  • Unusual file access patterns from guest users
  • Failed attempts to access sensitive directories

Network Indicators:

  • HTTP requests with encoded directory traversal sequences (%2e%2e%2f, ..%2f)
  • Multiple sequential requests attempting to access different directory levels

SIEM Query:

source="web_access_logs" AND (uri="*ultimateimagetool*" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*"))

🔗 References

📤 Share & Export