CVE-2023-6276: CWE-89 SQL Injection in Tongda OA 2017
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2023-6276 is a critical SQL Injection vulnerability identified in Tongda OA 2017 versions up to 11.9, specifically affecting the file general/wiki/cp/ct/delete.php. The vulnerability arises from improper sanitization of the PROJ_ID_STR parameter, which can be manipulated by an attacker to inject malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring user interaction, but does require some level of privileges (PR:L) as indicated by the CVSS vector. Exploitation could lead to unauthorized data disclosure, modification, or deletion, impacting confidentiality, integrity, and availability of the system. Although no known exploits are currently reported in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The issue is resolved by upgrading to Tongda OA 2017 version 11.10 or later. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Tongda OA 2017, this vulnerability poses a significant risk to sensitive business data managed within the OA platform. Successful exploitation could lead to data breaches involving confidential project information, unauthorized data manipulation, or service disruption. Given that Tongda OA is an office automation system commonly used for internal collaboration and document management, compromise could facilitate lateral movement within corporate networks, potentially exposing other critical systems. The medium severity rating suggests moderate impact, but the critical nature of SQL injection vulnerabilities and the public disclosure increase urgency. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. Additionally, the remote attack vector means attackers can exploit the vulnerability without physical access, increasing the threat surface.
Mitigation Recommendations
European organizations should prioritize upgrading Tongda OA 2017 installations to version 11.10 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict input validation and sanitization on the PROJ_ID_STR parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Employing database activity monitoring can help detect anomalous queries indicative of exploitation attempts. Restricting database user privileges associated with the OA application to the minimum necessary can limit the impact of a successful injection. Network segmentation should isolate the OA system from sensitive backend systems to reduce lateral movement risk. Regularly auditing and monitoring logs for unusual access patterns or errors related to the affected endpoint (general/wiki/cp/ct/delete.php) is recommended. Finally, organizations should ensure timely application of security patches and maintain an incident response plan tailored to web application attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-6276: CWE-89 SQL Injection in Tongda OA 2017
Description
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-6276 is a critical SQL Injection vulnerability identified in Tongda OA 2017 versions up to 11.9, specifically affecting the file general/wiki/cp/ct/delete.php. The vulnerability arises from improper sanitization of the PROJ_ID_STR parameter, which can be manipulated by an attacker to inject malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring user interaction, but does require some level of privileges (PR:L) as indicated by the CVSS vector. Exploitation could lead to unauthorized data disclosure, modification, or deletion, impacting confidentiality, integrity, and availability of the system. Although no known exploits are currently reported in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The issue is resolved by upgrading to Tongda OA 2017 version 11.10 or later. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Tongda OA 2017, this vulnerability poses a significant risk to sensitive business data managed within the OA platform. Successful exploitation could lead to data breaches involving confidential project information, unauthorized data manipulation, or service disruption. Given that Tongda OA is an office automation system commonly used for internal collaboration and document management, compromise could facilitate lateral movement within corporate networks, potentially exposing other critical systems. The medium severity rating suggests moderate impact, but the critical nature of SQL injection vulnerabilities and the public disclosure increase urgency. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. Additionally, the remote attack vector means attackers can exploit the vulnerability without physical access, increasing the threat surface.
Mitigation Recommendations
European organizations should prioritize upgrading Tongda OA 2017 installations to version 11.10 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict input validation and sanitization on the PROJ_ID_STR parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Employing database activity monitoring can help detect anomalous queries indicative of exploitation attempts. Restricting database user privileges associated with the OA application to the minimum necessary can limit the impact of a successful injection. Network segmentation should isolate the OA system from sensitive backend systems to reduce lateral movement risk. Regularly auditing and monitoring logs for unusual access patterns or errors related to the affected endpoint (general/wiki/cp/ct/delete.php) is recommended. Finally, organizations should ensure timely application of security patches and maintain an incident response plan tailored to web application attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-11-24T07:43:51.114Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e6630
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 4:25:25 PM
Last updated: 7/31/2025, 12:14:55 AM
Views: 7
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.