Skip to main content

CVE-2024-0344: CWE-89 SQL Injection in soxft TimeMail

Medium
VulnerabilityCVE-2024-0344cvecve-2024-0344cwe-89
Published: Tue Jan 09 2024 (01/09/2024, 21:00:05 UTC)
Source: CVE
Vendor/Project: soxft
Product: TimeMail

Description

A vulnerability, which was classified as critical, has been found in soxft TimeMail up to 1.1. Affected by this issue is some unknown functionality of the file check.php. The manipulation of the argument c leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250112.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:41:59 UTC

Technical Analysis

CVE-2024-0344 is a SQL Injection vulnerability identified in the soxft TimeMail application, specifically affecting versions up to 1.1. The vulnerability resides in the check.php file, where the argument 'c' is improperly sanitized, allowing an attacker to inject malicious SQL code. This type of injection can manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been publicly disclosed, though no known exploits are currently observed in the wild. The CVSS 3.1 base score is 5.5, indicating a medium severity level. The vector details (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) show that the attack requires adjacent network access (e.g., local network), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a low level, suggesting limited but non-negligible risk. The vulnerability is classified under CWE-89, which is a common and well-understood injection flaw that can be mitigated with proper input validation and parameterized queries. No patches have been linked yet, indicating that users of TimeMail versions 1.0 and 1.1 remain vulnerable until an update is released or mitigations are applied.

Potential Impact

For European organizations using soxft TimeMail versions 1.0 or 1.1, this vulnerability poses a risk of unauthorized access to sensitive email or scheduling data stored in backend databases. While the attack requires local or adjacent network access and low privileges, it could be exploited by insider threats or attackers who have gained limited access to the internal network. The potential impact includes data leakage, unauthorized data modification, and service disruption, which can affect business continuity and data privacy compliance obligations such as GDPR. Organizations relying on TimeMail for critical communications or scheduling may face operational disruptions or reputational damage if exploited. Given the medium severity and the absence of known active exploits, the immediate risk is moderate but should not be underestimated, especially in environments with less stringent network segmentation or insider threat controls.

Mitigation Recommendations

European organizations should immediately audit their use of soxft TimeMail and identify any deployments of versions 1.0 or 1.1. Until a vendor patch is available, mitigation should focus on restricting access to the affected check.php functionality by implementing strict network segmentation and firewall rules to limit access to trusted hosts only. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'c' parameter can reduce exploitation risk. Organizations should also conduct code reviews or implement input validation and parameterized queries if they maintain custom or extended versions of TimeMail. Monitoring logs for unusual database query patterns or failed injection attempts can provide early detection. Finally, organizations should engage with soxft for timely patch releases and plan for prompt updates once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-09T13:55:45.530Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8a1

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:41:59 PM

Last updated: 7/31/2025, 4:10:42 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats