CVE-2024-33275

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Webbax supernewsletter v1.4.21 and earlier allows remote attackers to execute arbitrary SQL commands via the product_search.php component. Attackers can escalate privileges, potentially gaining administrative access to affected PrestaShop installations. All users running vulnerable versions of this PrestaShop module are affected.

💻 Affected Systems

Products:
  • Webbax supernewsletter PrestaShop module
Versions: v1.4.21 and earlier
Operating Systems: Any OS running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PrestaShop installations using the vulnerable supernewsletter module. The module appears to be free/open source based on references.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the PrestaShop installation with administrative access, data theft, and potential lateral movement to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, data manipulation, and installation of backdoors.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, though SQL injection attempts may still cause service disruption.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable remotely via web interface without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but external threat is more significant due to internet exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The description suggests remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://security.friendsofpresta.org/modules/2024/04/29/supernewsletter.html

Restart Required: No

Instructions:

1. Check if supernewsletter module is installed. 2. Remove or disable the module immediately. 3. Monitor for official patch from vendor. 4. Consider alternative newsletter modules.

🔧 Temporary Workarounds

Disable supernewsletter module

all

Remove or disable the vulnerable module from PrestaShop administration

Navigate to PrestaShop admin > Modules > Module Manager > Find 'supernewsletter' > Disable/Delete

Web Application Firewall (WAF) rules

all

Implement WAF rules to block SQL injection patterns targeting product_search.php

Configure WAF to block requests containing SQL injection patterns to */modules/supernewsletter/* paths

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all user inputs
  • Restrict database user permissions to minimum required, removing administrative privileges

🔍 How to Verify

Check if Vulnerable:

Check PrestaShop modules directory for supernewsletter folder and examine version in module configuration

Check Version:

Check modules/supernewsletter/ directory for version file or configuration

Verify Fix Applied:

Verify supernewsletter module is removed or disabled in PrestaShop admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to product_search.php with SQL-like parameters
  • Failed login attempts followed by successful admin access

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) targeting /modules/supernewsletter/product_search.php

SIEM Query:

source="web_logs" AND uri="/modules/supernewsletter/product_search.php" AND (query="*SELECT*" OR query="*UNION*" OR query="*OR 1=1*")

🔗 References

📤 Share & Export