CVE-2023-41508

9.8 CRITICAL

📋 TL;DR

CVE-2023-41508 is a hard-coded credential vulnerability in Super Store Finder v3.6 that allows attackers to bypass authentication and gain administrative access to the application's administration panel. This affects all installations of Super Store Finder v3.6 that haven't been patched. Attackers can use the hard-coded password to take full control of affected systems.

💻 Affected Systems

Products:
  • Super Store Finder
Versions: v3.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of v3.6 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Super Store Finder application allowing attackers to modify store data, inject malicious code, steal sensitive information, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized administrative access leading to data manipulation, configuration changes, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass still possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded password and access to the administration panel URL.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.7 or later

Vendor Advisory: https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/

Restart Required: No

Instructions:

1. Download the latest version from the vendor website. 2. Backup your current installation. 3. Replace the vulnerable files with patched versions. 4. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Change Admin Panel URL

linux

Rename or move the administration panel directory to make it harder to find

mv /path/to/admin /path/to/new_admin_name

IP Restriction

all

Restrict access to the administration panel to trusted IP addresses only

# Add to .htaccess: Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the administration panel
  • Monitor authentication logs for unauthorized access attempts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check if Super Store Finder version is 3.6 by examining the application files or admin panel footer

Check Version:

Check the footer of the admin panel or examine the main application files for version information

Verify Fix Applied:

Verify the version has been updated to 3.7 or later and test authentication with the previously known hard-coded password

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with hard-coded credentials
  • Unauthorized access to admin panel from unusual IP addresses

Network Indicators:

  • HTTP requests to /admin or similar admin paths from unauthorized sources
  • Unusual patterns of administrative activity

SIEM Query:

source="web_logs" AND (url="*/admin*" OR url="*/wp-admin*") AND (status=200 OR status=302) AND NOT src_ip IN [trusted_ips]

🔗 References

📤 Share & Export