CVE-2023-33280

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries via HTTP requests to the Store Commander scquickaccounting module for PrestaShop. Attackers can perform blind SQL injection to extract, modify, or delete database content. All PrestaShop installations using scquickaccounting module versions through 3.7.3 are affected.

💻 Affected Systems

Products:
  • Store Commander scquickaccounting module for PrestaShop
Versions: through 3.7.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the scquickaccounting module to be installed and enabled on PrestaShop.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including theft of customer data, financial records, and administrative credentials; potential for full system takeover via SQL injection to RCE chaining.

🟠

Likely Case

Data exfiltration of sensitive information including customer PII, order details, and potentially administrative credentials stored in the database.

🟢

If Mitigated

Limited impact with proper input validation, WAF rules, and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires trivial HTTP requests with SQL injection payloads; blind SQL injection techniques are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7.4 or later

Vendor Advisory: https://friends-of-presta.github.io/security-advisories/modules/2023/05/25/scquickaccounting.html

Restart Required: No

Instructions:

1. Update scquickaccounting module to version 3.7.4 or later via PrestaShop admin panel or manual installation. 2. Verify module update completed successfully. 3. Test functionality to ensure no regression.

🔧 Temporary Workarounds

Disable scquickaccounting module

all

Temporarily disable the vulnerable module until patching is possible

Navigate to PrestaShop admin > Modules > Module Manager > Find scquickaccounting > Disable

WAF rule implementation

all

Implement web application firewall rules to block SQL injection patterns targeting the module

Add WAF rule: Detect and block requests containing SQL keywords (SELECT, UNION, etc.) to scquickaccounting endpoints

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all scquickaccounting module endpoints
  • Restrict database user permissions to minimum required (SELECT only, no DROP, INSERT, UPDATE)

🔍 How to Verify

Check if Vulnerable:

Check PrestaShop admin panel > Modules > Module Manager > scquickaccounting version. If version is 3.7.3 or earlier, system is vulnerable.

Check Version:

Check via PrestaShop admin interface: Modules > Module Manager > scquickaccounting

Verify Fix Applied:

Confirm scquickaccounting module version is 3.7.4 or later in PrestaShop admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in PrestaShop logs
  • Multiple failed SQL queries from single IP to scquickaccounting endpoints
  • HTTP requests with SQL keywords (UNION, SELECT, etc.) to module paths

Network Indicators:

  • HTTP POST/GET requests to /modules/scquickaccounting/ with SQL injection payloads
  • Unusual database query patterns from web server IP

SIEM Query:

source="prestashop.log" AND ("scquickaccounting" AND ("SQL" OR "syntax" OR "union" OR "select"))

🔗 References

📤 Share & Export