GithubHelp home page GithubHelp logo

mathiasreker / blmvuln Goto Github PK

View Code? Open in Web Editor NEW
36.0 9.0 6.0 420 KB

Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101

License: MIT License

PHP 100.00%
cve-2022-31101 free module php prestashop

blmvuln's Introduction

Contributors Forks Stargazers Issues MIT License

Fix Major Security Vulnerability on PrestaShop Websites 🚀

CVE-2022-31101 detector and fixer!

A newly found exploit could allow remote attackers to take control of your shop

Read more about the vulnerability here: https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/.

Fix the backdoor

The module will make a security fix that strengthens the MySQL Smarty cache storage against code injection attacks.

Run this module on your shop to close the security issue.

Remove the malware

Many who have been hacked through this vulnerability have found that their payment gateway has been replaced with a fake one. If you are a victim of this attack, the module can probably recover your shop.

Run this module on your shop to recover from the attack.

How does the module work?

The module scans the files of your shop based on a pattern. This pattern is designed to find vulnerabilities and infected files known from the security issue.

The module will solve the problems automatically or tell you how to solve them manually.

(back to top)

Install the module

  1. Download the latest version of the module: https://github.com/MathiasReker/blmvuln/releases/latest

  2. Login into your shop's back office

  3. Go to "Module Manager"

  4. Click on "Upload a Module"

  5. Upload and install the module

(back to top)

Usage

  1. Open the module and click "Run the cleaning process".

  2. After running the cleaning process, you can uninstall the module.

(back to top)

Compatibility

  • PrestaShop 1.6.1+
  • thirty bees 1.0.0+
  • PHP 7.0+

(back to top)

Roadmap

See the open issues for a complete list of proposed features (and known issues).

(back to top)

Contributing

If you have a suggestion to improve this, please fork the repo and create a pull request. You can also open an issue with the tag "enhancement". Finally, don't forget to give the project a star! Thanks again!

(back to top)

License

It is distributed under the MIT License. See LICENSE for more information.

(back to top)

blmvuln's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

blmvuln's Issues

BLM Vulnerability

Hi,

I have' just used your BLM Module. All has gone well but there is one file it says maybe infected but when running clean it does not fix it.

The file is .............
The following files looks infected. They will be restored or removed by running the cleaning process:
docker-compose.yml

Is this something i can fix or need to be worried about ?

Many thanks in advance.

cypr00

Issues with the module

HeyMathiasReker, thanks for the module. I've installed it got two issues:

  1. It shows me the volnurability of the files which I cannot find on FTP. For example - themes/default/img/process-icon-save-and-stay.png while I don't have a degault theme in the themes folder.

  2. When I hit the 'run the cleaning process' button - nothing happens.

Thanks!

Error

PS 1.7.8.9
PHP 7.3

ContextErrorException
in modules/blmvuln/src/domain/service/scanner/FilePermissions.php (line 105)

        if (empty($this->insecurePermissionFiles)) {
            return false;
        }
        foreach ($this->insecurePermissionFiles as $path) {
            chmod($path, is_dir($path) ? Config::DEFAULT_MODE_FOLDER : Config::DEFAULT_MODE_FILES);
        }
        return true;
    }

it cannot change the file or folder permission

stack trace

ContextErrorException

 

Symfony\Component\Debug\Exception\ContextErrorException: Warning: chmod(): Operation not permitted at modules/blmvuln/src/domain/service/scanner/FilePermissions.php:105 at PrestaShop\Module\BlmVuln\domain\service\scanner\FilePermissions->fix() (modules/blmvuln/controllers/admin/AdminBlmVulnController.php:74) at AdminBlmVulnController->fixVulnerabilities() (modules/blmvuln/controllers/admin/AdminBlmVulnController.php:41) at AdminBlmVulnController->renderList() (classes/controller/AdminController.php:2211) at AdminControllerCore->initContent() (classes/controller/Controller.php:306) at ControllerCore->run() (classes/Dispatcher.php:525) at DispatcherCore->dispatch() (zadmin/index.php:93)

Side admin menu entry

The module left multiple entries in side admin menu. Take a look on the screenshot (one per module installation).
Presta 1.6.1.24

blm

Controller has not been found...

Thanks for the module, i have installed it in 1.6.1.17 and after opening the module i got error msg.

Controller has not been found...

Error log is clean.

Install on Prestashop 1.6.1.14

[PrestaShop] Fatal error in module file :/modules/blmvuln/blmvuln.php:
syntax error, unexpected ':', expecting ';' or '{'

CRON task

Hello, is it possible to set up a CRON task?
thank you

Resolve the vulnerability but keep showing error on filepermissions

Hi first thanks a lot it seems to have fixed the vulnerability but it keeps showing this message :

The following filepermissions are insecure. They will be fixed by running the cleaning process:
themes/default/postcss.config.js
[...]

with a long list of files

But when I launch the cleaning it keep showing this after it ran.

What can I do ?

Thanks

Can't Uninstall the Module

Issue:
I couldn`t run nor configure the module and now I can't uninstall nor delete the module files. The hiperlink to the BLM vulnerability module at the administration left panel is still there.

Steps:

  1. I've downloaded the module at https://github.com/MathiasReker/blmvuln/releases/tag/2.2.1, and installed in my prestashop 8.0.2 version.
  2. Got an "incompatibility error" message and a "500 internal error" response from the server when I tried to configure the module using the left panel hiperlink.
  3. Went to the "module manager" and tried to uninstall and delete the files, but got the following response: "The uninstall action is not available for the blmvuln module. Ignored."

I've checked the comment and the Issue #4, but it seems that the version 2.2.1 isn't deleting the menu entry. I tought it would be interesting to record the issue appearance on the newer version.

Anyway, I couldnt' remove the menu entry using the method above.
:-(

BLM vulnerability

Buenos dias

Me gustaria saber si dispone de alguna versión mejorada, de este plugin, o versión de pago que tenga más protecciones.

Muchas gracias

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.