Jump to content

[FREE TOOL] Viking Production CVE Pentester 1.7.x / 8.x – Advanced PrestaShop Security Audit Suite


Recommended Posts

Hello PrestaShop community,

I'm releasing a profesionnal dedicated penetration testing tool i used since years for PrestaShop 1.7.x ( and on a couple of days 8.x  ) – designed for integrators, freelancers, hosting providers, and security teams who need to go beyond basic automated scanners.

The goal: Simulate a real attacker on your PrestaShop instance (legally, with proper authorization) and generate a professional PDF report that developers, sysadmins, and CISOs can actually use.

 

🎯 What the tool does

Core capabilities:

  • Identifies critical vulnerabilities (SQLi, RCE, XXE, SSRF, etc.) specific to PrestaShop installations
  • Audits system configuration (file permissions, backdoors, Lynis integration)
  • Maps known CVEs through a dedicated, editable JSON database
  • Generates 15-30 page PDF reports with CVSS scores, proof-of-concept evidence, and prioritized remediation

Not a replacement for full manual pentesting – think of it as a productivity booster to quickly identify the most dangerous issues.

 

🔧 Key Features

Web Application Penetration Tests :

• SQL Injection: Time-based, Error-based, Boolean-based, Union-based
• XXE: XML External Entity attacks  
• SSRF: Server-Side Request Forgery
• RCE: Remote Code Execution via PHP deserialization
• Command Injection: OS command injection vectors
• Authentication Bypass: Back-office login bypass attempts
• Open Redirect & CORS misconfigurations
• Session security (cookies, HttpOnly, Secure flags)
• SSL/TLS weak protocol detection
• Rate limiting & brute-force protection checks

🔍 System-Level Audit :

• Lynis integration (full Linux hardening audit)
• Automatic spidering (endpoint discovery)
• Vulnerable module detection
• Sensitive file exposure checks
• Backdoor hunting (known malicious patterns)
• Dangerous file permission scanning
• Database prefix verification

📊 PDF Reporting :

• 15-30 page PDF with Viking Production branding
• CVSS v3.1 risk scoring (0-10 scale)
• Executive summary for management
• Technical details + remediation steps
• Prioritized action plan (P0/P1/P2)
• Proof-of-concept payloads (sanitized)

🚀 Quick Demo (Less than 2 minutes) :

# Standard audit (safe for production)
python3 cve.py https://your-prestashop.tld

# Full system audit + Lynis
python3 cve.py https://your-prestashop.tld --path /var/www/prestashop

# Generates: prestashop_security_report.pdf

Sample output: Identifies PrestaShop version → Maps applicable CVEs → Tests vectors → Delivers PDF report.

 

🗄️ Extensible CVE Database :

The tool uses a JSON CVE database you can customize:

{
  "id": "CVE-2022-31181",
  "title": "SQL Injection Smarty Cache",
  "cvss_score": 9.8,
  "affected_versions": ["1.7.0.0", "1.7.8.6"],
  "payloads": ["<sanitized_payloads>"],
  "remediation": "Update to 1.7.8.7+"
}

🎁 Why this tool?

  • PrestaShop-specific: Tests actual CVEs affecting 1.7.x/8.x
  • Production-ready reports: Not just "vulnerable/not vulnerable"
  • Developer-friendly: Clear payloads, remediation steps
  • Sysadmin integration: Lynis + file system checks
  • Free & open-source: MIT license
  • Actively maintained: 2026 roadmap includes 8.x support, ML anomaly detection

 

📚 Resources :

GitHub: https://github.com/VikingProduction/CVE-prestashop.1-7.X-pentester
README available in French & English

 

⚖️ IMPORTANT: Legal & Responsible Use Only

Authorized use:

  • Your own PrestaShop installations
  • Client sites with written permission
  • Staging/test environments
  • Contractual security assessments

Strictly prohibited:

  • Testing third-party sites without authorization
  • Production sites without owner consent
  • Any illegal access attempts
  • Law compliance of your country, in france: Article 323-1 Code Pénal, GDPR, NIS Directive.

 

Questions? Need help with a specific CVE? Want to contribute new tests? Reply here or open an issue!

Stay secure,
Viking Production

Link to comment
Share on other sites

Hello,

Be careful not to delegate too much to AI :) we can see quite a few traces of unchecked “vibe coding” here (leftover original comments, avoidable logic errors, etc.). The tool is powerful, but it does not replace a proper self-review. A quick manual check would help avoid these basic mistakes that undermine the quality of the script.

 

Link to comment
Share on other sites

1 hour ago, Prestashop Addict said:

Hi, thank you for this tool. BUT in your source code you give explicitly exploits, that will help attackers 😞

Hello dude, all the explicitly exploits are described on the CVE list so basically it's the responssibility of the owner to maintain their shop update.

 

1 hour ago, wepresta said:

Hello,

Be careful not to delegate too much to AI :) we can see quite a few traces of unchecked “vibe coding” here (leftover original comments, avoidable logic errors, etc.). The tool is powerful, but it does not replace a proper self-review. A quick manual check would help avoid these basic mistakes that undermine the quality of the script.

 

I've effectly passed on copilot for code reviewing. The tool will be maintained by myself, i'll passed it to multi threading and i agree that we need to recheck manually after the pentest to be sure of the accuracy of the CVE tested and reported. Btw if you see any improvments let me know !

Link to comment
Share on other sites

2 hours ago, Prestashop Addict said:

In your report you mention url concerned, but for modules you dont specify version impacted by CVE. This can produce false positives and anxious reaction to the site owner 😉

yes that's right and i'am currently working on with more CVE included and some fixed (see dev)

Edited by Viking Production (see edit history)
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...