CVE-2024-34988

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in the PrestaShop 'Complete for Create a Quote in Frontend + Backend Pro' module allows attackers to execute arbitrary SQL commands through multiple controller methods. Attackers can potentially view sensitive database information, modify data, or gain unauthorized access. All PrestaShop installations using affected versions of this third-party module are vulnerable.

💻 Affected Systems

Products:
  • PrestaShop with 'Complete for Create a Quote in Frontend + Backend Pro' module (askforaquotemodul)
Versions: <= 1.0.51
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PrestaShop installations with this specific third-party module installed and enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, remote code execution, or complete system takeover.

🟠

Likely Case

Unauthorized access to sensitive customer data (personal information, orders, payment details), database manipulation, and potential authentication bypass.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited, and this affects multiple controller methods accessible from both frontend and backend.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 1.0.51

Vendor Advisory: https://security.friendsofpresta.org/modules/2024/06/20/askforaquotemodul.html

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules > Module Manager. 3. Find 'Complete for Create a Quote in Frontend + Backend Pro' module. 4. Check current version. 5. If version <= 1.0.51, update to latest version from Buy Addons marketplace. 6. Clear PrestaShop cache after update.

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the affected module until patched

UPDATE ps_module SET active = 0 WHERE name = 'askforaquotemodul'

WAF rule for SQL injection

all

Implement web application firewall rules to block SQL injection patterns targeting the vulnerable endpoints

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs in the module
  • Apply principle of least privilege to database user accounts used by the module

🔍 How to Verify

Check if Vulnerable:

Check module version in PrestaShop admin panel under Modules > Module Manager > 'Complete for Create a Quote in Frontend + Backend Pro'

Check Version:

SELECT version FROM ps_module WHERE name = 'askforaquotemodul'

Verify Fix Applied:

Confirm module version is > 1.0.51 and test vulnerable endpoints with SQL injection payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in PrestaShop logs
  • Multiple failed SQL queries from single IP
  • Requests to vulnerable endpoints with SQL keywords

Network Indicators:

  • HTTP requests containing SQL injection patterns to vulnerable controller endpoints
  • Unusual database query patterns from web server

SIEM Query:

source="prestashop.logs" AND ("Askforaquotemodul" AND ("SQL" OR "syntax" OR "error" OR "UNION" OR "SELECT"))

🔗 References

📤 Share & Export