CVE-2023-37824

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Sitolog sitologapplicationconnect v7.8.a and earlier allows attackers to execute arbitrary SQL commands via the /activate_hook.php endpoint. This affects all users running vulnerable versions of the Sitolog application connect module, potentially leading to data theft, modification, or complete system compromise.

💻 Affected Systems

Products:
  • Sitolog sitologapplicationconnect
Versions: v7.8.a and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PrestaShop module 'sitologapplicationconnect' specifically. The vulnerability is in the activate_hook.php component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data exfiltration, modification, or deletion; potential remote code execution via database functions; full application takeover.

🟠

Likely Case

Database information disclosure, authentication bypass, privilege escalation, and data manipulation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via web parameter manipulation requires minimal technical skill. No authentication needed to access the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v7.8.b or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/10/11/sitologapplicationconnect.html

Restart Required: No

Instructions:

1. Download latest version from official source. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Clear PrestaShop cache. 5. Verify functionality.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Temporarily block access to /activate_hook.php via web server configuration or WAF.

# Apache: RewriteRule ^activate_hook\.php$ - [F,L]
# Nginx: location ~ /activate_hook\.php$ { deny all; }

Input validation filter

all

Implement input validation to reject SQL injection patterns at the application level.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules
  • Restrict network access to affected systems, isolate from internet

🔍 How to Verify

Check if Vulnerable:

Check if /modules/sitologapplicationconnect/activate_hook.php exists and version is ≤7.8.a

Check Version:

Check module version in PrestaShop admin panel or examine /modules/sitologapplicationconnect/ files

Verify Fix Applied:

Verify version is ≥7.8.b and test endpoint with SQL injection payloads (safely in test environment)

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple requests to /activate_hook.php with SQL keywords
  • Database query anomalies

Network Indicators:

  • HTTP requests to /activate_hook.php containing SQL syntax
  • Unusual database connection patterns from web server

SIEM Query:

web.url:*activate_hook.php AND (web.query:*SELECT* OR web.query:*UNION* OR web.query:*OR*1=1*)

🔗 References

📤 Share & Export