CVE-2024-2759
📋 TL;DR
An improper access control vulnerability in the Apaczka plugin for PrestaShop allows unauthenticated attackers to gather information from saved templates. This affects all Apaczka plugin installations from version 1 through version 4. The vulnerability enables unauthorized data access without requiring any authentication.
💻 Affected Systems
- Apaczka plugin for PrestaShop
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could extract sensitive shipping templates, customer data, or configuration details, potentially leading to data breaches, privacy violations, or further targeted attacks.
Likely Case
Unauthenticated information disclosure of shipping templates and related data, which could be used for reconnaissance or to understand business operations.
If Mitigated
Limited to no impact if proper authentication controls are implemented or the plugin is patched/disabled.
🎯 Exploit Status
Exploitation requires no authentication and minimal technical skill, making it accessible to basic attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v5 or later
Vendor Advisory: https://cert.pl/en/posts/2024/04/CVE-2024-2759/
Restart Required: No
Instructions:
1. Log into your PrestaShop admin panel.
2. Navigate to the Modules section.
3. Locate the Apaczka plugin.
4. Update to version 5 or later.
5. Verify the update completes successfully.
🔧 Temporary Workarounds
Disable Apaczka Plugin
allTemporarily disable the vulnerable plugin to prevent exploitation.
Navigate to PrestaShop admin > Modules > Module Manager > Disable Apaczka plugin
Restrict Access via Web Server
linuxBlock access to Apaczka plugin endpoints using web server configuration.
For Apache: Add 'Deny from all' to .htaccess for Apaczka directories
For Nginx: Add 'deny all;' to location block for Apaczka paths
🧯 If You Can't Patch
- Disable the Apaczka plugin immediately to eliminate the vulnerability.
- Implement network-level access controls to restrict external access to the PrestaShop instance.
🔍 How to Verify
Check if Vulnerable:
Check the Apaczka plugin version in PrestaShop admin panel under Modules > Module Manager.
Check Version:
Not applicable; check via PrestaShop admin interface.
Verify Fix Applied:
Confirm the Apaczka plugin version is 5 or higher in the PrestaShop admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to Apaczka plugin endpoints without authentication.
- HTTP requests to Apaczka template URLs from unauthorized IPs.
Network Indicators:
- Inbound requests to paths containing 'apaczka' or plugin-specific endpoints without prior authentication.
SIEM Query:
source="web_server_logs" AND uri="*apaczka*" AND user_agent NOT IN ("legitimate_bots")