CVE-2024-33276

9.8 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability in the FME Modules preorderandnotification module for PrestaShop. Attackers can execute arbitrary SQL commands through the PreorderModel::getIdProductAttributesByIdAttributes() method, potentially compromising the database. All users of preorderandnotification v3.1.0 and earlier are affected.

💻 Affected Systems

Products:
  • FME Modules preorderandnotification
Versions: v3.1.0 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PrestaShop installations using the vulnerable module version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, deletion, or full system takeover through SQL command execution.

🟠

Likely Case

Unauthorized data access, privilege escalation, or database manipulation leading to business disruption.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permissions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection typically has low exploitation complexity when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.1.1 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2024/04/25/preorderandnotification.html

Restart Required: No

Instructions:

1. Download latest version from official source. 2. Backup current installation. 3. Replace module files. 4. Clear PrestaShop cache.

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation for all user inputs to the vulnerable method.

WAF Rules

all

Deploy web application firewall rules to block SQL injection patterns.

🧯 If You Can't Patch

  • Disable or remove the preorderandnotification module immediately.
  • Implement network segmentation to isolate affected systems from critical assets.

🔍 How to Verify

Check if Vulnerable:

Check module version in PrestaShop admin panel under Modules > Module Manager.

Check Version:

Check PrestaShop database: SELECT version FROM ps_module WHERE name = 'preorderandnotification';

Verify Fix Applied:

Confirm module version is v3.1.1 or later and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts
  • Unexpected database errors

Network Indicators:

  • SQL keywords in HTTP requests to vulnerable endpoint
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND (url="*PreorderModel*" OR method="*getIdProductAttributesByIdAttributes*") AND (query="*SELECT*" OR query="*UNION*" OR query="*INSERT*")

🔗 References

📤 Share & Export