Prestashop Module Vulnerability: PHPUnit Dependencyby Czarina R. Content Manager and SEO
Prestashop module vulnerability has been discovered in prestashop 1.5, prestashop 1.6. and PS 1.7, related to PHPUnit dependency. These prestashop versions are affected from a malware called XSAM_XADOO which comes from a vulnerability in phpunit.
Mainly the known modules possibly containing a security vulnerabilities are:
/modules/ps_facetedsearch/vendor/phpunit - if exist, as newer module versions do not have this folder.
/modules/gamification/vendor/phpunit - if exist, as newer module versions do not have this folder.
and third development:
To make sure you are safe, please delete all the sub-folders /phpunit/ in the folder modules mentioned.
Background of the prestashop module vulnerability discovery
Sometimes on Thursday, January 2, 2020, a customer reported to prestashop team that its shop has been compromised by a malware named XsamXadoo Bot. The bot, according to the report,
was able to upload some malware files into the shop which allowed him to access and control several shop settings.
So, if you suspect that some files have been uploaded to your server without you knowing it. Or that some files you are not familiar of are in your prestashop core files. Perhaps that is a good time to check if your prestashop shop is compromised.
After some research, the Prestashop developers believe that the bot was able to upload those malware using a known vulnerability in the PHP tool PHPUnit that has been reported as CVE-2017-9841.
CVE-2017-9841 is a code injection vulnerability in PHPUnit. Several open-source systems like Drupal, Laravel framework, and Wordpress has been victimized by the Remote Code Execution of CVE-2017-9841.
PHPUnit is a programmer-oriented testing framework for PHP. PHPUnit 4.x versions before 4.8.28 and 5.x versions before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a substring. This vulnerability is exploitable only if the /vendor folder is publicly accessible.
PHPUnit is used as a tool to build prestashop module
PHPUnit is used as a tool to build prestashop modules, but it should only be used on a developer computer. So it is very unlikely the vulnerable files will be found on a server and make the server vulnerable.
Unlikely but not impossible. These files have wrongly been added into some prestashop module ZIP archives. If a shop has downloaded one of these compromised archives, and has not deleted it since, then the shop is now vulnerable.
The Prestashop team has confirmed that there are multiple shops running that are vulnerable right now (= can be attacked at any time) and multiple shops running that are already compromised.
How to find if my shop is vulnerable
If you think your shop has been compromised, please look into the modules/ directory of your shop, and for each module in this directory, check whether it contains a directory “vendor” and inside this “vendor” directory, there is another directory with name “phpunit”.
If one module contains this vendor/phpunit directory, this module might make you vulnerable and allow an outside attacker to upload malware files into your shop.
How to protect my shop if a module makes it vulnerable
If you have found than one module on your shop contains the vendor/phpunit directory, you can simply delete the vendor/phpunit directory. It is not necessary for the module correct behavior. This simple step will protect your shop from this vulnerability.
On a Linux server, the cleanup procedure to fix a vulnerable shop can be performed using the following bash command line from the modules/ folder from the shop:
NOTE: This command requires the relevant user rights.
However you must also check whether, while your shop was vulnerable, it has been compromised.
What can the attacker do to my shop?
This vulnerability allows an attacker to execute PHP code on your shop. This means that an attacker can,
- read the content of your database to steal data
- upload files on your server
- modify files on your server
Once your data is stolen, there is no way you can retrieved it back and there is no reliable way to check whether your data has been stolen. However you should be able to find out whether some files have been added or modified.
What has been done about this vulnerability
Prestashop team is still researching module archives to track whether or not they contain the vendor/phpunit vulnerable directory. They said,
We will remove or patch all archives which contain this vulnerable directory, then communicate the list of the vulnerable module versions and how to protect shops.
List of vulnerable archives
They have found that the following ZIP archives contained the vulnerable files:
All these packages have been deleted from GitHub.
Distributed through PrestaShop API
Modules released with vulnerable version of PHPUnit:
- module pscartabandonmentpro ; versions v2.0.1 and 2.0.2 (PHPUnit v4.8.36)
- module ps_facetedsearch ; version v2.2.1 (PHPUnit v5.0.9)
Modules released with recent version of PHPUnit:
- module ps_checkout ; versions v1.0.8 & v1.0.9 (PHPUnit v5.7.27)
- module ps_facetedsearch ; version v3.0.0 (PHPUnit v5.7.27)
- module autoupgrade ; versions 4.x (PHPUnit v5.7.27)
Currently unknown status:
- module gamification - the versions are being searched
If we find additional vulnerable archives, we will add them to this list.
What can you do if your shop is compromised?
- An immediate remedy is to upgrade to the latest version of PHPUnit. This issue was fixed in PHPUnit versions 4.8.28 and 5.6.3.
- Find and Delete the directory name /phpunit.
As of this posting, this is all the information that is available and the recommended remedy for this prestashop module vulnerability.
Additional resource for your ecommerce shop security;
Contact us if you need help with ecommerce shop security by using the contact us link above or use the comment section to let us know!
Created on Jan 7th 2020 02:33. Viewed 117 times.