PrestaShop <= 1.5.1 Persistent XSS Tested under: Firefox, Chrome and Safari latest versions Discover Credits: David Sopas - davidsopas@gmail.com | @dsopas | davidsopas.com/labs Original link: http://davidsopas.com/labs/prestashop_xss.txt Description: PrestaShop is the most reliable and flexible Open-source e-commerce software. Since 2007, PrestaShop has revolutionized the industry by providing features that engage shoppers and increase online sales. The Prestateam consists of over 100 passionate individuals and more than 350,000 community members dedicated to innovated technology. It has more than 2.000.000 downloads and won the best open-source e-commerce software in the last few years. When installing and analyzing PrestaShop on a secure environment I discovered that it's possible to bypass isCleanHtml() function, used in many places, in this case in particular the Contact Form. A user could use this vulnerability, a Persistent Cross-site Scripting, to execute malicious payloads on admins message box. Proof of concept: In the message field a user could write: or Both Base64 strings are mainly encoded. Those XSS vectors bypass the filter on isCleanHtml() and execute automatically when the admin check the messages on the admin area. This is critical and could be used to implement very bad scenarios. Keep in mind that on some webmail variations, the code is also executed. A user can even play with heading

and other HTML on message box. or Click here Again, encoding with Base64 could also obfuscate a little bit. I think that in this case in particular, HTML should be stripped out because it has no meaning in my opinion on the contact form. Solution: Vendor reported that upgrading PrestaShop to version 1.5.2 will fix admins message box bug. HTML on email accounts still a possibility in the latest version. According to the vendor, it will be fixed on the next version. References: http://www.owasp.org/index.php/Cross-site_Scripting_(XSS) https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet http://ha.ckers.org/ http://forge.prestashop.com/browse/PSCFV-5204 -- David Sopas davidsopas@gmail.com # @dsopas