CVE-2024-41651# Blind SSRF to RCE Exploit - PrestaShop 8.1.7
This document outlines a Blind SSRF to RCE exploit on a fresh PrestaShop 8.1.7 docker installation.
## Prerequisites
- Ensure you have at least an outdated module installed, for example:
- `ps_facetedsearch`
- Download the original package:
- [Download ps_facetedsearch v3.16.1](https://api.prestashop-project.org/assets/modules/ps_facetedsearch/v3.16.1/ps_facetedsearch.zip)
## Steps to Reproduce
1. **Prepare the Malicious File:**
- Download and unzip the original package.
- Choose a suitable file and function to inject the malicious command.
- Payload example: Create a file in the root directory (e.g., `pwn3ed_bayram.txt`). Note: Shells could also be popped.

- Repack the module and Host it.


2. **Upgrade the Module:**
- Open the module manager in PrestaShop.


3. **Intercept and Modify the Request:**
- Intercept the request

- Change the `source` parameter to point to the server hosting your malicious zip file.



## Expected Results
- **Before Exploit:**
- Filesystem as expected with no additional files.

- **After Exploit:**
- The file `pwn3ed_bayram.txt` is successfully created in the root directory.

## Additional Notes
- Reverse shells could be obtained using similar methods.
[4.0K] /data/pocs/f02cbabbf4480802e2fc41d9d6c3412917018c8e
├── [169K] 10.png
├── [149K] 11.png
├── [122K] 1.png
├── [ 16K] 2.png
├── [ 34K] 3.png
├── [112K] 4.png
├── [ 88K] 5.png
├── [ 29K] 6.png
├── [125K] 7.png
├── [196K] 8.png
├── [ 41K] 9.png
└── [1.5K] README.md
0 directories, 12 files