The open-source Prestashop e-commerce platform has disclosed that threat actors are actively exploiting a zero day vulnerability on its platform to inject malicious skimming code and capture sensitive payment information.

PrestaShop is a popular e-commerce platform used by roughly 300,000 members in Europe and Latin America.

Infection details

  • The zero day attack begins by targeting an older platform version vulnerable to SQL injection exploits. 
  • The actively exploited SQL injection vulnerability is being tracked as CVE-2022-36408.
  • The flaw allows threat actors to conduct arbitrary code execution and steal payment information from customers.
  • The zero day vulnerability affects PrestaShop versions 1.6.0.10 and later, as well as versions 1.7.8.2 and later.

Attack details


  • To exploit the zero day, attackers send a POST request to an exposed endpoint with a parameterless GET request to the homepage and create a blm[.]php file at the root directory.
  • The blm[.]php is a web shell that allows attackers to run remote commands on the targeted server. This web shell is used to inject a fake payment form on the shop's checkout page.
  • Additionally, the attackers may plant malicious code anywhere on the website.
 

Likely solution

PrestaShop has conceded to address the zero day vulnerability in version 1.7.8.7 of the platform. Prestashop vulnerability can be overcome by upgrading the flawed version as advised below.
  • The immediate solution is to upgrade all used modules to the latest available version of 1.7.8.7.
  • Customers running older, vulnerable versions of the platform can manually remove the MySQL Smarty cache feature by deleting code from a configuration file.
  • If the site has already been compromised, applying the security update won't remediate the problem.

The Prestashop security advisory explained that the platform’s latest version and its modules are free from SQL vulnerabilities.
Cyware Publisher

Publisher

Cyware