Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34990: n/a

0
Critical
VulnerabilityCVE-2024-34990cvecve-2024-34990
Published: Wed Jun 19 2024 (06/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In the module "Help Desk - Customer Support Management System" (helpdesk) up to version 2.4.0 from FME Modules for PrestaShop, a customer can upload .php files. Methods `HelpdeskHelpdeskModuleFrontController::submitTicket()` and `HelpdeskHelpdeskModuleFrontController::replyTicket()` allow upload of .php files on a predictable path for connected customers.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:16:22 UTC

Technical Analysis

CVE-2024-34990 is a critical vulnerability affecting the Help Desk - Customer Support Management System module (helpdesk) developed by FME Modules for the PrestaShop e-commerce platform, specifically versions up to 2.4.0. The flaw resides in the module's handling of file uploads within the methods HelpdeskHelpdeskModuleFrontController::submitTicket() and HelpdeskHelpdeskModuleFrontController::replyTicket(). These methods allow customers, without any authentication or user interaction, to upload files with a .php extension. The uploaded files are stored in predictable server paths, enabling attackers to execute arbitrary PHP code remotely. This vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating a failure to properly validate and restrict file types during upload. The CVSS 3.1 base score is 10.0, reflecting the highest severity due to its network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. The vulnerability enables remote code execution (RCE), which can lead to full system takeover, data theft, defacement, or further lateral movement within the network. Currently, no official patches or updates have been released by FME Modules, and no known exploits have been detected in the wild. However, the ease of exploitation and critical impact make this a severe threat for all organizations using the affected module in their PrestaShop installations.

Potential Impact

The impact of CVE-2024-34990 is severe and wide-ranging. Successful exploitation allows unauthenticated attackers to upload and execute arbitrary PHP scripts on the web server hosting the vulnerable PrestaShop module. This can lead to complete system compromise, including theft or destruction of sensitive customer and business data, installation of backdoors or malware, defacement of websites, and disruption of e-commerce operations. Given the critical nature of the vulnerability and the lack of authentication requirements, attackers can easily exploit it remotely over the internet. Organizations relying on this module for customer support risk significant financial loss, reputational damage, and regulatory penalties due to data breaches. The vulnerability also poses a risk to the broader network if attackers use the compromised server as a pivot point for further attacks. The absence of patches increases the urgency for immediate mitigation to prevent exploitation.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Immediately disable or restrict access to the Help Desk - Customer Support Management System module to prevent file uploads. 2) Employ web application firewalls (WAFs) with custom rules to detect and block attempts to upload .php files or access known upload paths associated with the module. 3) Implement strict server-side file upload validation and filtering to reject files with executable extensions, especially .php. 4) Restrict file permissions and execution rights on upload directories to prevent execution of uploaded scripts. 5) Monitor web server logs and file system changes for suspicious activity indicative of exploitation attempts. 6) Consider isolating the affected module in a sandboxed environment or container to limit potential damage. 7) Regularly back up critical data and verify restoration procedures. 8) Stay alert for official patches or updates from FME Modules and apply them promptly once available. 9) Conduct thorough security assessments of PrestaShop installations to identify and remediate similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c55b7ef31ef0b563137

Added to database: 2/25/2026, 9:40:37 PM

Last enriched: 2/28/2026, 3:16:22 AM

Last updated: 4/12/2026, 6:15:17 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses