CVE-2023-33278

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute blind SQL injection attacks via HTTP requests to the Store Commander scexportcustomers module in PrestaShop. It affects PrestaShop installations using the vulnerable module version, potentially exposing sensitive database information including customer data, credentials, and configuration details.

💻 Affected Systems

Products:
  • PrestaShop with Store Commander scexportcustomers module
Versions: scexportcustomers module through version 3.6.1
Operating Systems: All platforms running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the scexportcustomers module to be installed and enabled. The vulnerability is in the module, not core PrestaShop.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Extraction of sensitive customer data (PII, payment information), admin credentials, and database schema information.

🟢

If Mitigated

Limited information disclosure if database permissions are properly restricted and input validation is enforced elsewhere.

🌐 Internet-Facing: HIGH - Exploitable via HTTP requests without authentication, making internet-facing instances immediately vulnerable.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires trivial HTTP requests with SQL injection payloads. Public proof-of-concept demonstrates blind SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: scexportcustomers module version 3.6.2 or later

Vendor Advisory: https://friends-of-presta.github.io/security-advisories/modules/2023/05/25/scexportcustomers.html

Restart Required: No

Instructions:

1. Update the scexportcustomers module to version 3.6.2 or later via PrestaShop admin panel or manual installation. 2. Verify the module version in the module manager. 3. Clear any PrestaShop cache if applicable.

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the scexportcustomers module until patched

Navigate to PrestaShop admin > Modules > Module Manager > Find scexportcustomers > Disable

Web Application Firewall rule

all

Block SQL injection patterns targeting the module endpoint

Add WAF rule to block requests containing SQL keywords to /modules/scexportcustomers/

🧯 If You Can't Patch

  • Disable the scexportcustomers module immediately
  • Implement network-level restrictions to limit access to the module endpoint

🔍 How to Verify

Check if Vulnerable:

Check module version in PrestaShop admin panel under Modules > Module Manager > scexportcustomers. If version is 3.6.1 or earlier, you are vulnerable.

Check Version:

Check PrestaShop database: SELECT version FROM ps_module WHERE name = 'scexportcustomers';

Verify Fix Applied:

Confirm module version is 3.6.2 or later in the module manager. Test the export functionality to ensure it works without errors.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /modules/scexportcustomers/ with SQL keywords (UNION, SELECT, INSERT, etc.)
  • Unusual database query patterns from web server IP

Network Indicators:

  • HTTP POST/GET requests to module endpoint with encoded SQL payloads
  • Multiple rapid requests to customer export functionality

SIEM Query:

web.url:*scexportcustomers* AND (web.query:*UNION* OR web.query:*SELECT* OR web.query:*INSERT*)

🔗 References

📤 Share & Export