CVE-2024-33269

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical SQL injection vulnerability in the Prestaddons flashsales module for PrestaShop. Attackers can execute arbitrary SQL commands through the FsModel::getFlashSales method, potentially compromising the entire database. All PrestaShop installations using flashsales module version 1.9.7 or earlier are affected.

💻 Affected Systems

Products:
  • Prestaddons flashsales module for PrestaShop
Versions: 1.9.7 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all PrestaShop installations using the vulnerable flashsales module version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, privilege escalation, and remote code execution via database functions.

🟠

Likely Case

Data exfiltration of sensitive information (customer data, payment details, admin credentials) and potential website defacement.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, though some data exposure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The vulnerability is in a public method that may be accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.8 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2024/04/25/flashsales.html

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules > Module Manager. 3. Find 'flashsales' module. 4. Click 'Upgrade' to version 1.9.8 or later. 5. Clear PrestaShop cache.

🔧 Temporary Workarounds

Disable flashsales module

all

Temporarily disable the vulnerable module until patching is possible.

Navigate to PrestaShop admin > Modules > Module Manager > Find 'flashsales' > Click 'Disable'

WAF rule implementation

all

Implement web application firewall rules to block SQL injection patterns targeting the flashsales module.

Add WAF rule: Detect and block SQL injection patterns in requests to flashsales-related endpoints

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the FsModel::getFlashSales method
  • Restrict database user permissions to minimum required privileges

🔍 How to Verify

Check if Vulnerable:

Check flashsales module version in PrestaShop admin panel under Modules > Module Manager.

Check Version:

Check PrestaShop database: SELECT version FROM ps_module WHERE name = 'flashsales';

Verify Fix Applied:

Confirm flashsales module version is 1.9.8 or later in the module manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected database errors in application logs

Network Indicators:

  • SQL injection patterns in HTTP requests to flashsales endpoints
  • Unusual outbound database connections

SIEM Query:

source="web_server" AND (uri="*flashsales*" AND (method="POST" OR method="GET") AND (payload="*SELECT*" OR payload="*UNION*" OR payload="*OR 1=1*"))

🔗 References

📤 Share & Export