First published: Tue May 14 2024(Updated: )
### Impact Only PrestaShops with customer-thread feature flag enabled are impacted, starting from PrestaShop 8.1.0. The impact is substantial, when the customer thread feature flag is enabled, through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. Consequence: the script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. ### Patches This vulnerability is patched in 8.1.6. ### Workarounds As long as you have not upgraded to 8.1.6, a simple workaround is to disable the customer-thread feature-flag. Thank you to Ayoub AIT ELMOKHTAR, who discovered this vulnerability and share it with the PrestaShop team.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/prestashop/prestashop | >=8.1.0<8.1.6 | 8.1.6 |
Prestashop | >=8.1.0<8.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34716 is considered a high severity vulnerability due to its ability to allow malicious file uploads via the contact form when the customer-thread feature is enabled.
To fix CVE-2024-34716, upgrade your PrestaShop installation to version 8.1.6 or later.
CVE-2024-34716 affects PrestaShop versions from 8.1.0 up to 8.1.6 when the customer-thread feature is enabled.
CVE-2024-34716 impacts the front-office contact form, allowing the upload of potentially malicious files.
Yes, the customer-thread feature flag must be enabled for CVE-2024-34716 to be exploitable.