CVE-2024-34994

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on PrestaShop installations using the Channable module. It affects all PrestaShop sites running Channable module version 3.2.1 or earlier, potentially leading to data theft, modification, or complete system compromise.

💻 Affected Systems

Products:
  • PrestaShop Channable module
Versions: Up to and including version 3.2.1
Operating Systems: All operating systems running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: All PrestaShop installations with the vulnerable Channable module are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, remote code execution, and full system takeover.

🟠

Likely Case

Data theft including customer information, order data, and administrative credentials stored in the database.

🟢

If Mitigated

Limited impact if database permissions are properly restricted and input validation is enforced at other layers.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable by unauthenticated guests via public endpoints.
🏢 Internal Only: MEDIUM - Internal systems could still be vulnerable if exposed to internal attackers or compromised accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a public controller accessible to guests, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.2.2 or later

Vendor Advisory: https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-06-18-channable.md

Restart Required: No

Instructions:

1. Update the Channable module to version 3.2.2 or later via PrestaShop admin panel or manual installation. 2. Clear PrestaShop cache. 3. Verify the module is functioning correctly.

🔧 Temporary Workarounds

Disable Channable module

all

Temporarily disable the vulnerable module until patching is possible

Navigate to PrestaShop admin > Modules > Module Manager > Find Channable > Disable

Restrict access to ChannableFeedModuleFrontController

linux

Block public access to the vulnerable controller via web server configuration

# Apache: <Location /module/channable/feed> Require all denied </Location>
# Nginx: location ~ /module/channable/feed { deny all; }

🧯 If You Can't Patch

  • Implement strict WAF rules to block SQL injection patterns targeting the Channable endpoint.
  • Apply database-level restrictions to limit the impact of successful SQL injection attacks.

🔍 How to Verify

Check if Vulnerable:

Check the module version in PrestaShop admin panel under Modules > Module Manager > Channable. If version is 3.2.1 or earlier, you are vulnerable.

Check Version:

Check PrestaShop admin panel or examine modules/channable/channable.php for version information

Verify Fix Applied:

Confirm the Channable module version is 3.2.2 or later in the module manager and test the feed functionality works correctly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests to /module/channable/feed endpoint
  • Error logs containing SQL syntax errors

Network Indicators:

  • HTTP POST requests to /module/channable/feed with SQL injection patterns
  • Unusual outbound database connections from web server

SIEM Query:

source="web_access_logs" AND uri="/module/channable/feed" AND (method="POST" OR params CONTAINS "UNION" OR params CONTAINS "SELECT" OR params CONTAINS "OR 1=1")

🔗 References

📤 Share & Export