CVE-2024-2759

7.5 HIGH

📋 TL;DR

An improper access control vulnerability in the Apaczka plugin for PrestaShop allows unauthenticated attackers to gather information from saved templates. This affects all Apaczka plugin installations from version 1 through version 4. The vulnerability enables unauthorized data access without requiring any authentication.

💻 Affected Systems

Products:
  • Apaczka plugin for PrestaShop
Versions: v1 through v4
Operating Systems: Any OS running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default configurations of the Apaczka plugin within the specified version range.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive shipping templates, customer data, or configuration details, potentially leading to data breaches, privacy violations, or further targeted attacks.

🟠

Likely Case

Unauthenticated information disclosure of shipping templates and related data, which could be used for reconnaissance or to understand business operations.

🟢

If Mitigated

Limited to no impact if proper authentication controls are implemented or the plugin is patched/disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill, making it accessible to basic attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5 or later

Vendor Advisory: https://cert.pl/en/posts/2024/04/CVE-2024-2759/

Restart Required: No

Instructions:

1. Log into your PrestaShop admin panel.
2. Navigate to the Modules section.
3. Locate the Apaczka plugin.
4. Update to version 5 or later.
5. Verify the update completes successfully.

🔧 Temporary Workarounds

Disable Apaczka Plugin

all

Temporarily disable the vulnerable plugin to prevent exploitation.

Navigate to PrestaShop admin > Modules > Module Manager > Disable Apaczka plugin

Restrict Access via Web Server

linux

Block access to Apaczka plugin endpoints using web server configuration.

For Apache: Add 'Deny from all' to .htaccess for Apaczka directories
For Nginx: Add 'deny all;' to location block for Apaczka paths

🧯 If You Can't Patch

  • Disable the Apaczka plugin immediately to eliminate the vulnerability.
  • Implement network-level access controls to restrict external access to the PrestaShop instance.

🔍 How to Verify

Check if Vulnerable:

Check the Apaczka plugin version in PrestaShop admin panel under Modules > Module Manager.

Check Version:

Not applicable; check via PrestaShop admin interface.

Verify Fix Applied:

Confirm the Apaczka plugin version is 5 or higher in the PrestaShop admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Apaczka plugin endpoints without authentication.
  • HTTP requests to Apaczka template URLs from unauthorized IPs.

Network Indicators:

  • Inbound requests to paths containing 'apaczka' or plugin-specific endpoints without prior authentication.

SIEM Query:

source="web_server_logs" AND uri="*apaczka*" AND user_agent NOT IN ("legitimate_bots")

🔗 References

📤 Share & Export