CVE-2023-46346
📋 TL;DR
This vulnerability allows unauthenticated attackers to perform path traversal attacks in the 'Product Catalog Export PRO' module for PrestaShop. Attackers can access sensitive files containing personal information without any authentication. All PrestaShop installations using affected versions of this module are vulnerable.
💻 Affected Systems
- Product Catalog (CSV, Excel, XML) Export PRO (exportproducts) module for PrestaShop
📦 What is this software?
Exportproducts by Myprestamodules
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through sensitive file disclosure including database credentials, configuration files, and customer personal data, potentially leading to data breach and regulatory penalties.
Likely Case
Unauthorized access to customer personal information, configuration files, and other sensitive data stored on the server.
If Mitigated
Limited impact with proper file permissions and web server configuration restricting access to sensitive directories.
🎯 Exploit Status
The vulnerability requires no authentication and path traversal attacks are well-documented and easy to automate.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 4.1.2 or later
Vendor Advisory: https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html
Restart Required: No
Instructions:
1. Log into PrestaShop admin panel
2. Navigate to Modules > Module Manager
3. Find 'Product Catalog Export PRO' module
4. Check current version
5. Update to version 4.1.2 or later
6. Clear PrestaShop cache
🔧 Temporary Workarounds
Disable module
allTemporarily disable the vulnerable module until patching is possible
Navigate to PrestaShop admin > Modules > Module Manager > Find 'Product Catalog Export PRO' > Click Disable
Restrict file access via web server
allConfigure web server to block path traversal attempts
For Apache: Add 'AllowOverride None' and 'Deny from all' to sensitive directories in .htaccess
For Nginx: Add location blocks to restrict access to sensitive paths
🧯 If You Can't Patch
- Remove the module completely from the PrestaShop installation
- Implement web application firewall rules to block path traversal patterns in URLs
🔍 How to Verify
Check if Vulnerable:
Check module version in PrestaShop admin panel under Modules > Module Manager > Product Catalog Export PRO
Check Version:
Check PrestaShop admin panel or examine modules/exportproducts/exportproducts.php file version header
Verify Fix Applied:
Confirm module version is 4.1.2 or later and test that path traversal attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' or '..\' patterns to exportproducts module endpoints
- Unusual file access patterns from unauthenticated users
Network Indicators:
- HTTP requests with path traversal payloads to /modules/exportproducts/ endpoints
SIEM Query:
web.url:*exportproducts* AND (web.url:*..%2F* OR web.url:*..%5C*)