S4E Mobile Logo

CVE-2020-15081 Scanner

CVE-2020-15081 Scanner - Information Disclosure vulnerability in PrestaShop

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

15 days 17 hours

Scan only one

URL

Toolbox

PrestaShop is an open-source e-commerce solution used widely by online retailers for managing their online stores. It provides a comprehensive platform for creating, managing, and scaling online shops. PrestaShop offers a range of features, including product catalog management, payment gateways, and store customization. It is popular among small to medium-sized businesses for its flexibility and community support. Retailers use PrestaShop to effectively handle inventory, customer orders, and sales. With a modular design, it allows users to enhance functionality through plugins and add-ons.

This Information Disclosure vulnerability affects PrestaShop versions after 1.5.0.0 and before 1.7.6.6. The vulnerability is related to the directory listing in the upload directory due to a missing index.php file. This oversight leads to exposure where unauthorized users can enumerate files contained within the upload directory. This information exposure could leak sensitive data, potentially putting customer privacy at risk. The issue underlines the importance of securing directory structures against unauthorized access.

The vulnerable endpoint is the upload directory, specifically when accessed via a URL structured like "http://[PrestaShop_URL]/upload/". The missing index.php file fails to redirect or restrict directory access, allowing potential attackers to browse the directory contents if directory listing is not disabled. Matchers in the scan look for HTTP status code 200 and certain content keywords indicating an active directory listing. This can lead to the exposure of file names, file structure, and possibly the content of uploaded files.

Exploitation of this vulnerability may result in unauthorized exposure to sensitive information stored within the directory. This could include customer data, invoice files, or internal documents, which attackers could use for malicious purposes. The exposure might also lead to privacy breaches and legal implications for businesses failing to protect customer data adequately. In severe cases, it could damage the business reputation and erode customer trust.

REFERENCES

Get started to protecting your digital assets