CVE-2023-39677
📋 TL;DR
This vulnerability allows unauthenticated attackers to access PHP configuration information via the send.php file in affected Prestashop modules. It exposes sensitive server details like environment variables, configuration settings, and system paths. All websites using MyPrestaModules v6.2.9 or UpdateProducts v3.6.9 are affected.
💻 Affected Systems
- MyPrestaModules Prestashop Module
- UpdateProducts Prestashop Module
📦 What is this software?
Product Catalog \(csv\, Excel\) Import by Myprestamodules
View all CVEs affecting Product Catalog \(csv\, Excel\) Import →
Updateproducts by Updateproducts Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain complete PHP configuration including database credentials, API keys, and server paths, leading to full system compromise through follow-up attacks.
Likely Case
Attackers gather reconnaissance data about server configuration, PHP settings, and installed modules to plan targeted attacks.
If Mitigated
Information disclosure limited to non-sensitive PHP settings if proper access controls and file permissions are implemented.
🎯 Exploit Status
Exploitation requires only accessing the vulnerable send.php URL. No special tools or skills needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest versions from MyPrestaModules
Vendor Advisory: https://myprestamodules.com/
Restart Required: No
Instructions:
1. Log into Prestashop admin panel
2. Navigate to Modules > Module Manager
3. Check for updates to MyPrestaModules and UpdateProducts modules
4. Update to latest versions
5. Clear Prestashop cache
🔧 Temporary Workarounds
Remove send.php file
linuxDelete or rename the vulnerable send.php file to prevent access
rm modules/myprestamodules/send.php
rm modules/updateproducts/send.php
Restrict access via .htaccess
allBlock access to send.php files using web server configuration
<Files "send.php">
Order Allow,Deny
Deny from all
</Files>
🧯 If You Can't Patch
- Implement web application firewall rules to block requests to send.php
- Restrict module directory permissions to prevent unauthorized file access
🔍 How to Verify
Check if Vulnerable:
Access http://your-site.com/modules/myprestamodules/send.php or http://your-site.com/modules/updateproducts/send.php. If PHP configuration information is displayed, the system is vulnerable.
Check Version:
Check module versions in Prestashop admin panel under Modules > Module Manager
Verify Fix Applied:
Attempt to access the send.php URLs after patching. You should receive a 404 error or access denied message instead of PHP information.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /modules/*/send.php
- Unusual access to module directories
Network Indicators:
- GET requests to send.php endpoints
- Traffic patterns showing reconnaissance activity
SIEM Query:
source="web_access_logs" AND uri="/modules/*/send.php"