Blind SSRF to RCE Exploit - PrestaShop 8.1.7

This document outlines a Blind SSRF to RCE exploit on a fresh PrestaShop 8.1.7 docker installation.

Prerequisites

Steps to Reproduce

  1. Prepare the Malicious File:

    • Download and unzip the original package.
    • Choose a suitable file and function to inject the malicious command.
    • Payload example: Create a file in the root directory (e.g., pwn3ed_bayram.txt). Note: Shells could also be popped. Payload
    • Repack the module and Host it. Repack Repack
  2. Upgrade the Module:

    • Open the module manager in PrestaShop. Repack Repack
  3. Intercept and Modify the Request:

    • Intercept the request Repack
    • Change the source parameter to point to the server hosting your malicious zip file. Repack Repack Repack

Expected Results

  • Before Exploit:

    • Filesystem as expected with no additional files. Repack
  • After Exploit:

    • The file pwn3ed_bayram.txt is successfully created in the root directory. Repack

Additional Notes

  • Reverse shells could be obtained using similar methods.