CVE-2024-28389

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in KnowBand spinwheel v3.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the sendEmail() method. Attackers can gain escalated privileges and access sensitive information from the database. All users running affected versions of the spinwheel module are vulnerable.

💻 Affected Systems

Products:
  • KnowBand spinwheel module for PrestaShop
Versions: v3.0.3 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PrestaShop installations using the spinwheel module. The vulnerability is in the module itself, not core PrestaShop.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the PrestaShop database including customer PII, admin credential theft, and potential remote code execution through database functions.

🟠

Likely Case

Data exfiltration of customer information, admin account takeover, and privilege escalation within the PrestaShop application.

🟢

If Mitigated

Limited impact if proper input validation and WAF rules block SQL injection attempts, though underlying vulnerability remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The public disclosure includes technical details that facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.0.4 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2024/03/12/spinwheel.html

Restart Required: No

Instructions:

1. Download latest spinwheel module from official source. 2. Backup current module. 3. Replace old module files with patched version. 4. Clear PrestaShop cache.

🔧 Temporary Workarounds

Disable spinwheel module

all

Temporarily disable the vulnerable module until patching is possible

Navigate to PrestaShop admin > Modules > Module Manager > Find spinwheel > Disable

WAF SQL injection rules

all

Implement web application firewall rules to block SQL injection patterns targeting the sendEmail endpoint

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application level
  • Restrict database user permissions to minimum required for module functionality

🔍 How to Verify

Check if Vulnerable:

Check spinwheel module version in PrestaShop admin panel under Modules > Module Manager

Check Version:

Check module version in PrestaShop admin interface or examine module files for version metadata

Verify Fix Applied:

Confirm spinwheel module version is v3.0.4 or later and test sendEmail functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected database schema changes

Network Indicators:

  • POST requests to spinwheel sendEmail endpoint with SQL syntax in parameters
  • Unusual outbound database connections

SIEM Query:

source="web_logs" AND uri="*spinwheel*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*DELETE*")

🔗 References

📤 Share & Export