CVE-2023-45379

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries on PrestaShop installations using the 'Rotator Img' module. Attackers can potentially steal sensitive data, modify database contents, or gain administrative access. All PrestaShop sites using vulnerable versions of the posrotatorimg module are affected.

💻 Affected Systems

Products:
  • PrestaShop with posrotatorimg (Rotator Img) module
Versions: All versions up to and including 1.1
Operating Systems: All operating systems running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the module itself, not in PrestaShop core. Only affects sites using this specific third-party module.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, website defacement, backdoor installation, and full administrative control of the PrestaShop instance.

🟠

Likely Case

Data exfiltration of customer information, order details, and administrative credentials, potentially leading to further system compromise.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, though some information disclosure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with automated tools. The 'guest can perform' description indicates no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with module developer for patched version

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/10/17/posrotatorimg.html

Restart Required: No

Instructions:

1. Remove the posrotatorimg module from your PrestaShop installation. 2. Check for updated version from the developer. 3. If no patch exists, permanently remove the module and find alternative functionality.

🔧 Temporary Workarounds

Module Disablement

all

Temporarily disable the vulnerable module to prevent exploitation

Navigate to PrestaShop admin panel > Modules > Module Manager > Find 'posrotatorimg' > Click Disable

WAF Rule Implementation

all

Add SQL injection detection rules to web application firewall

Add rule to block SQL injection patterns in POST/GET parameters

🧯 If You Can't Patch

  • Remove the posrotatorimg module completely from your PrestaShop installation
  • Implement strict input validation and parameterized queries at application level

🔍 How to Verify

Check if Vulnerable:

Check if modules/posrotatorimg directory exists in your PrestaShop installation and check version in module configuration

Check Version:

Check module version in PrestaShop admin panel under Modules > Module Manager > posrotatorimg

Verify Fix Applied:

Verify module is removed or updated to version above 1.1, then test for SQL injection using safe testing methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected database errors in application logs

Network Indicators:

  • SQL injection patterns in HTTP requests
  • Unusual outbound database connections
  • High volume of requests to module endpoints

SIEM Query:

source="web_logs" AND (url="*posrotatorimg*" AND (query="*SELECT*" OR query="*UNION*" OR query="*OR 1=1*"))

🔗 References

📤 Share & Export