CVE-2023-43981

9.8 CRITICAL

📋 TL;DR

CVE-2023-43981 is a critical deserialization vulnerability in Presto Changeo testsitecreator that allows remote code execution. Attackers can exploit the delete_excluded_folder.php component to execute arbitrary code on affected systems. This affects all users running testsitecreator version 1.1.1 or earlier.

💻 Affected Systems

Products:
  • Presto Changeo testsitecreator
Versions: Up to and including version 1.1.1
Operating Systems: Any OS running PHP (typically Linux/Windows with web servers)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable component accessible via web are affected. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, install malware, steal data, and pivot to other systems.

🟠

Likely Case

Remote code execution leading to web server compromise, data theft, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF rules blocking suspicious PHP requests, and restricted file permissions.

🌐 Internet-Facing: HIGH - The vulnerable component is accessible via web requests and can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but external exposure is the primary concern.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a publicly accessible PHP file and requires minimal technical skill to exploit. Public exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.1.2 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/10/03/testsitecreator.html

Restart Required: No

Instructions:

1. Download the latest version from the vendor. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Verify the delete_excluded_folder.php file has been updated.

🔧 Temporary Workarounds

Delete vulnerable file

linux

Remove or rename the vulnerable delete_excluded_folder.php file to prevent exploitation

rm /path/to/testsitecreator/delete_excluded_folder.php
mv /path/to/testsitecreator/delete_excluded_folder.php /path/to/testsitecreator/delete_excluded_folder.php.disabled

Web Application Firewall rule

all

Block requests to the vulnerable endpoint using WAF rules

🧯 If You Can't Patch

  • Restrict access to the vulnerable PHP file using .htaccess or web server configuration
  • Implement network segmentation to isolate affected systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check if delete_excluded_folder.php exists in the testsitecreator directory and examine its contents for insecure deserialization patterns

Check Version:

Check the plugin version in the PrestaShop admin panel or examine the plugin's version file

Verify Fix Applied:

Verify the delete_excluded_folder.php file has been updated to version 1.1.2+ or removed, and test that deserialization attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to delete_excluded_folder.php
  • PHP deserialization errors in web server logs
  • Unexpected process execution from web server user

Network Indicators:

  • HTTP requests to delete_excluded_folder.php with serialized data payloads
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_server_logs" AND uri="*delete_excluded_folder.php*" AND (method="POST" OR status="500")

🔗 References

📤 Share & Export