Viking Production Posted 8 hours ago Share Posted 8 hours ago Hello PrestaShop community, I'm releasing a profesionnal dedicated penetration testing tool i used since years for PrestaShop 1.7.x ( and on a couple of days 8.x ) – designed for integrators, freelancers, hosting providers, and security teams who need to go beyond basic automated scanners. The goal: Simulate a real attacker on your PrestaShop instance (legally, with proper authorization) and generate a professional PDF report that developers, sysadmins, and CISOs can actually use. 🎯 What the tool does Core capabilities: Identifies critical vulnerabilities (SQLi, RCE, XXE, SSRF, etc.) specific to PrestaShop installations Audits system configuration (file permissions, backdoors, Lynis integration) Maps known CVEs through a dedicated, editable JSON database Generates 15-30 page PDF reports with CVSS scores, proof-of-concept evidence, and prioritized remediation Not a replacement for full manual pentesting – think of it as a productivity booster to quickly identify the most dangerous issues. 🔧 Key Features ✅ Web Application Penetration Tests : • SQL Injection: Time-based, Error-based, Boolean-based, Union-based • XXE: XML External Entity attacks • SSRF: Server-Side Request Forgery • RCE: Remote Code Execution via PHP deserialization • Command Injection: OS command injection vectors • Authentication Bypass: Back-office login bypass attempts • Open Redirect & CORS misconfigurations • Session security (cookies, HttpOnly, Secure flags) • SSL/TLS weak protocol detection • Rate limiting & brute-force protection checks 🔍 System-Level Audit : • Lynis integration (full Linux hardening audit) • Automatic spidering (endpoint discovery) • Vulnerable module detection • Sensitive file exposure checks • Backdoor hunting (known malicious patterns) • Dangerous file permission scanning • Database prefix verification 📊 PDF Reporting : • 15-30 page PDF with Viking Production branding • CVSS v3.1 risk scoring (0-10 scale) • Executive summary for management • Technical details + remediation steps • Prioritized action plan (P0/P1/P2) • Proof-of-concept payloads (sanitized) 🚀 Quick Demo (Less than 2 minutes) : # Standard audit (safe for production) python3 cve.py https://your-prestashop.tld # Full system audit + Lynis python3 cve.py https://your-prestashop.tld --path /var/www/prestashop # Generates: prestashop_security_report.pdf Sample output: Identifies PrestaShop version → Maps applicable CVEs → Tests vectors → Delivers PDF report. 🗄️ Extensible CVE Database : The tool uses a JSON CVE database you can customize: { "id": "CVE-2022-31181", "title": "SQL Injection Smarty Cache", "cvss_score": 9.8, "affected_versions": ["1.7.0.0", "1.7.8.6"], "payloads": ["<sanitized_payloads>"], "remediation": "Update to 1.7.8.7+" } 🎁 Why this tool? PrestaShop-specific: Tests actual CVEs affecting 1.7.x/8.x Production-ready reports: Not just "vulnerable/not vulnerable" Developer-friendly: Clear payloads, remediation steps Sysadmin integration: Lynis + file system checks Free & open-source: MIT license Actively maintained: 2026 roadmap includes 8.x support, ML anomaly detection 📚 Resources : GitHub: https://github.com/VikingProduction/CVE-prestashop.1-7.X-pentester README available in French & English ⚖️ IMPORTANT: Legal & Responsible Use Only ✅ Authorized use: Your own PrestaShop installations Client sites with written permission Staging/test environments Contractual security assessments ❌ Strictly prohibited: Testing third-party sites without authorization Production sites without owner consent Any illegal access attempts Law compliance of your country, in france: Article 323-1 Code Pénal, GDPR, NIS Directive. Questions? Need help with a specific CVE? Want to contribute new tests? Reply here or open an issue! Stay secure, Viking Production Link to comment Share on other sites More sharing options...
Prestashop Addict Posted 6 hours ago Share Posted 6 hours ago Hi, thank you for this tool. BUT in your source code you give explicitly exploits, that will help attackers 😞 Link to comment Share on other sites More sharing options...
wepresta Posted 5 hours ago Share Posted 5 hours ago Hello, Be careful not to delegate too much to AI we can see quite a few traces of unchecked “vibe coding” here (leftover original comments, avoidable logic errors, etc.). The tool is powerful, but it does not replace a proper self-review. A quick manual check would help avoid these basic mistakes that undermine the quality of the script. Link to comment Share on other sites More sharing options...
Viking Production Posted 4 hours ago Author Share Posted 4 hours ago 1 hour ago, Prestashop Addict said: Hi, thank you for this tool. BUT in your source code you give explicitly exploits, that will help attackers 😞 Hello dude, all the explicitly exploits are described on the CVE list so basically it's the responssibility of the owner to maintain their shop update. 1 hour ago, wepresta said: Hello, Be careful not to delegate too much to AI we can see quite a few traces of unchecked “vibe coding” here (leftover original comments, avoidable logic errors, etc.). The tool is powerful, but it does not replace a proper self-review. A quick manual check would help avoid these basic mistakes that undermine the quality of the script. I've effectly passed on copilot for code reviewing. The tool will be maintained by myself, i'll passed it to multi threading and i agree that we need to recheck manually after the pentest to be sure of the accuracy of the CVE tested and reported. Btw if you see any improvments let me know ! Link to comment Share on other sites More sharing options...
Prestashop Addict Posted 2 hours ago Share Posted 2 hours ago In your report you mention url concerned, but for modules you dont specify version impacted by CVE. This can produce false positives and anxious reaction to the site owner 😉 Link to comment Share on other sites More sharing options...
Viking Production Posted 31 minutes ago Author Share Posted 31 minutes ago (edited) 2 hours ago, Prestashop Addict said: In your report you mention url concerned, but for modules you dont specify version impacted by CVE. This can produce false positives and anxious reaction to the site owner 😉 yes that's right and i'am currently working on with more CVE included and some fixed (see dev) Edited 3 minutes ago by Viking Production (see edit history) Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now