CVE-2024-10731

A vulnerability, which was classified as critical, was found in Tongda OA up to 11.10. Affected is an unknown function of the file /pda/appcenter/check_seal.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/LvZCh/td/issues/16 Exploit
https://vuldb.com/?ctiid.282900 Permissions Required
https://vuldb.com/?id.282900 Third Party Advisory
https://vuldb.com/?submit.433531 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*

History

04 Nov 2024, 16:43

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8
First Time Tongda2000
Tongda2000 office Anywhere
References () https://github.com/LvZCh/td/issues/16 - () https://github.com/LvZCh/td/issues/16 - Exploit
References () https://vuldb.com/?ctiid.282900 - () https://vuldb.com/?ctiid.282900 - Permissions Required
References () https://vuldb.com/?id.282900 - () https://vuldb.com/?id.282900 - Third Party Advisory
References () https://vuldb.com/?submit.433531 - () https://vuldb.com/?submit.433531 - Third Party Advisory
CPE cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en Tongda OA hasta la versión 11.10. Se trata de una función desconocida del archivo /pda/appcenter/check_seal.php. La manipulación del argumento ID provoca una inyección SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.

03 Nov 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-03 10:15

Updated : 2024-11-04 16:43


NVD link : CVE-2024-10731

Mitre link : CVE-2024-10731

CVE.ORG link : CVE-2024-10731


JSON object : View

Products Affected

tongda2000

  • office_anywhere
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')