CVE-2023-45899

7.5 HIGH

📋 TL;DR

This authentication bypass vulnerability in the SuperUser module for PrestaShop allows attackers to gain unauthorized administrative access without valid credentials. Attackers can exploit this by sending a specially crafted HTTP request to the vulnerable component. All PrestaShop installations using affected versions of the SuperUser module are at risk.

💻 Affected Systems

Products:
  • idnovate SuperUser module for PrestaShop
Versions: All versions before v2.4.2
Operating Systems: All operating systems running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PrestaShop installations with the SuperUser module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative takeover of the PrestaShop instance, allowing attackers to modify content, steal customer data, install backdoors, or disrupt operations.

🟠

Likely Case

Unauthorized administrative access leading to data theft, website defacement, or installation of malicious code.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains a critical finding.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via HTTP requests and affects web applications typically exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the PrestaShop instance.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires a crafted HTTP call but no authentication, making it relatively easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.4.2

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/10/26/superuser.html

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules > Module Manager. 3. Find SuperUser module. 4. Update to version 2.4.2 or later. 5. Clear PrestaShop cache.

🔧 Temporary Workarounds

Disable SuperUser Module

all

Temporarily disable the vulnerable module until patching is possible

Navigate to Modules > Module Manager in PrestaShop admin, find SuperUser, click Disable

Restrict Access via Web Application Firewall

all

Block requests to the vulnerable endpoint

Add WAF rule to block requests containing 'SuperUserSetuserModuleFrontController' in URL

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the PrestaShop admin interface
  • Enable detailed logging and monitoring for authentication bypass attempts and unusual admin activity

🔍 How to Verify

Check if Vulnerable:

Check SuperUser module version in PrestaShop admin panel under Modules > Module Manager

Check Version:

Check version in PrestaShop admin panel or examine module files for version information

Verify Fix Applied:

Confirm SuperUser module version is 2.4.2 or higher in module manager

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to SuperUserSetuserModuleFrontController with unusual parameters
  • Multiple failed authentication attempts followed by successful admin login from same IP
  • Admin logins from unexpected IP addresses or user agents

Network Indicators:

  • HTTP POST/GET requests to SuperUser-related endpoints with crafted parameters
  • Unusual traffic patterns to admin login pages

SIEM Query:

web.url:*SuperUserSetuserModuleFrontController* AND (http.method:POST OR http.method:GET)

🔗 References

📤 Share & Export