CVE-2023-50061

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands on PrestaShop installations using the Op'art Easy Redirect module. Attackers can potentially read, modify, or delete database content, including sensitive customer data. All PrestaShop sites using affected versions of the Op'art Easy Redirect module are vulnerable.

💻 Affected Systems

Products:
  • PrestaShop Op'art Easy Redirect module
Versions: >= 1.3.8 and <= 1.3.12
Operating Systems: All platforms running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PrestaShop installation with the vulnerable module enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, website defacement, or full system takeover through SQL injection to remote code execution chaining.

🟠

Likely Case

Database information disclosure including customer data, admin credentials, and configuration secrets.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, though SQL injection remains dangerous.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via hookActionDispatcher() function suggests straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.13 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel
2. Navigate to Modules > Module Manager
3. Search for 'Op'art Easy Redirect'
4. Update to version 1.3.13 or later
5. Clear PrestaShop cache

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the Op'art Easy Redirect module until patched

Web Application Firewall rules

all

Implement WAF rules to block SQL injection patterns targeting hookActionDispatcher

🧯 If You Can't Patch

  • Disable the Op'art Easy Redirect module immediately
  • Implement strict input validation and parameterized queries at application level

🔍 How to Verify

Check if Vulnerable:

Check module version in PrestaShop admin panel under Modules > Module Manager > Op'art Easy Redirect

Check Version:

No direct command; check via PrestaShop admin interface

Verify Fix Applied:

Confirm module version is 1.3.13 or later in admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to hookActionDispatcher with SQL-like parameters
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP POST requests with SQL injection payloads targeting the vulnerable endpoint

SIEM Query:

web_requests WHERE url CONTAINS 'hookActionDispatcher' AND (params CONTAINS 'UNION' OR params CONTAINS 'SELECT' OR params CONTAINS 'OR 1=1')

🔗 References

📤 Share & Export