CVE-2023-43979

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in ETS Soft ybc_blog allows attackers to execute arbitrary SQL commands through the getPosts() function. It affects all ybc_blog installations before version 4.4.0, potentially compromising the entire database. PrestaShop stores using this module are vulnerable.

💻 Affected Systems

Products:
  • ETS Soft ybc_blog module for PrestaShop
Versions: All versions before 4.4.0
Operating Systems: All platforms running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PrestaShop installation with ybc_blog module enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive customer data, admin credential theft, and potential remote code execution via database functions.

🟠

Likely Case

Data exfiltration of customer information, order history, and potentially stored payment data from the PrestaShop database.

🟢

If Mitigated

Limited impact with proper input validation and database user privilege restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via frontend controller suggests unauthenticated exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.0

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/11/14/ybc_blog.html

Restart Required: No

Instructions:

1. Download ybc_blog v4.4.0 or newer from official source. 2. Backup current installation. 3. Replace module files with patched version. 4. Clear PrestaShop cache.

🔧 Temporary Workarounds

Input Validation Filter

all

Add parameter validation to filter SQL injection attempts

Modify Ybc_blogBlogModuleFrontController::getPosts() to validate and sanitize all input parameters

Module Disable

linux

Temporarily disable ybc_blog module

php bin/console prestashop:module disable ybc_blog

🧯 If You Can't Patch

  • Implement WAF rules to block SQL injection patterns targeting ybc_blog endpoints
  • Restrict database user permissions to SELECT only for ybc_blog database operations

🔍 How to Verify

Check if Vulnerable:

Check ybc_blog module version in PrestaShop admin panel under Modules > Module Manager

Check Version:

Check modules/ybc_blog/ybc_blog.php for version declaration

Verify Fix Applied:

Confirm ybc_blog version is 4.4.0 or higher in module manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to ybc_blog endpoints with SQL syntax in parameters

Network Indicators:

  • HTTP requests containing SQL keywords (UNION, SELECT, INSERT) to blog-related endpoints

SIEM Query:

web.url:*ybc_blog* AND (web.param:*UNION* OR web.param:*SELECT* OR web.param:*--*)

🔗 References

📤 Share & Export