Copyright©2022NethuesTechnologies(P)Ltd PrestaShop1.7.8.7 isouttoFixMajorSecurityVulnerability Web:www.nethues.com Email:info@nethues.com
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/d2f436d8210db9520a1f4db17610b2ee.jpeg)
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/9339221c194e55fc1bb09797b89516d0.jpeg)
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/337029522e6f78ef8a4129196cf2da8e.jpeg)
Copyright©2022NethuesTechnologies(P)Ltd IfyourunaneCommercestoreonPrestaShop,you’reprobablyawarethatanew version(1787)wasreleasedlastweek Thisupdateisparticularlysignificantbecauseitfixesseveralcriticalsecurityissuesthat couldallowanunauthorizedusertoaccessormodifydataonyoursite. Ifyou’rerunningPrestaShop1.7.8.6,werecommendupgradingto1.7.8.7assoonas possibletotakeadvantageofthissecuritypatch. LikepreviousPrestaShopversions,thisupgradeisrecommendedtokeepyourshop safefromattacks Let’sdiscussmoreaboutit Wheretheissuelies? PrestaShopInchasbeenpoweringeCommercestoresforyearsnowUnfortunately, somehostileperformersexploitknownandunknownsecurityvulnerabilitiestoinject maliciouscodeintoPrestaShopwebsites,makingthemstealcustomers’payment information. Whoareunderattack? PrestaShopsthatarevulnerabletoSQLinjectionattacks. OnlineeCommercestoreusingoutdatedsoftwareormodules PrestaShopsthatareusingvulnerablethirdpartymodules.
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/d2f436d8210db9520a1f4db17610b2ee.jpeg)
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/64ac04533384c35b23c7eb9e7a38079b.jpeg)
Copyright©2022NethuesTechnologies(P)Ltd Howdoestheattackwork? BasedontheconversationsbetweenthedevelopersandtheeCommerceowners,the systematicmethodofoperationlookslikethis: 1)TheattackermakesaPOSTrequesttotheendpointvulnerabletoSQLinjection. 2)AGETrequesttothehomepagewithnoparametersissubmittedwithinone secondbytheattackerItresultsinaPHPfilecalledblmphpattherootofthe eCommercedirectory. 3)Finally,theattackersubmitsaGETrequesttothenewfile,blmphp,allowingthem toperformrandomactivities. Fakepaymentformsareinjectedintothefrontofficecheckoutpage,andthe customersfilltheircreditcardinformationontheartificialform,unknowinglysendingit totheattackers Howtokeepyouronlinebusinesssafe? EnsurethatyourPrestaShopisoperatingonthelatestversionandthatyour modulesareupdated.Thus,preventingyoureCommercefrombeingexposedto knownandactivelyexploitedSQLinjectionvulnerabilities. Tobreaktheattackchain,physicallydisablingtheMySQLSmartycachestorage featureinPrestaShopcodeisrecommended. BugsFixed StrengthenstheMySQLSmartycachestorageagainstcodeinjectionattacks Security. EvalinjectioniftheshopisvulnerabletoanSQLinjection Reminder:KeepyourPrestaShopversionupdatedtopreventsuchattacks.Don’t forgettoregularlycheckforupdatesrelatedtoyourPrestaShopsoftware,modules,and serverenvironment
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/d2f436d8210db9520a1f4db17610b2ee.jpeg)
Copyright©2022NethuesTechnologies(P)Ltd SafestapproachtoupgradeyourPrestaShop Withtheseandmanyotherchanges,PrestaShop1.7.8.7isamusthaveupdate. BeawarethatmanagingPrestaShoponyourowncaninvitevariousbugsortechnical issues!ConsidercontactingaspecialisttoperformafullauditofyourPrestaShopand workonit. BeingaPrestaShoppartneragency,wehavecertifiedPrestaShopexpertsonboardwho canhelpyouupgrade/updatetothelatestversionofPrestaShop,i.e.,1.7.8.7. Let’sconnectandgettheneedfuldone
![](https://assets.isu.pub/document-structure/220812073413-bbc2c26dfd62dbded5d838e6bb786cf1/v1/d2f436d8210db9520a1f4db17610b2ee.jpeg)