CVE-2024-0480: CWE-89 SQL Injection in Taokeyun
A vulnerability was found in Taokeyun up to 1.0.5. It has been declared as critical. Affected by this vulnerability is the function index of the file application/index/controller/m/Drs.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250585 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0480 is a critical SQL Injection vulnerability identified in Taokeyun versions up to 1.0.5. The vulnerability exists in the HTTP POST request handler, specifically in the 'index' function of the file application/index/controller/m/Drs.php. The flaw arises from improper sanitization or validation of the 'cid' parameter, which is susceptible to malicious input manipulation. An attacker can exploit this vulnerability remotely without requiring authentication or user interaction. By injecting crafted SQL payloads into the 'cid' parameter, the attacker can manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or disruption of service. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection issue. The CVSS v3.1 base score is 7.3, reflecting high severity due to network attack vector, no privileges required, and no user interaction needed. Although no public exploits are currently known to be actively used in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. No official patches have been linked yet, which suggests that affected organizations must rely on other mitigation strategies until a fix is available. Given the nature of the vulnerability, attackers could leverage it to extract sensitive information, alter or delete data, or cause denial of service, impacting the confidentiality, integrity, and availability of affected systems.
Potential Impact
For European organizations using Taokeyun, this vulnerability poses significant risks. The ability to perform SQL injection remotely without authentication means that attackers can potentially access sensitive business data, customer information, or intellectual property stored in backend databases. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. Additionally, attackers could modify or delete critical data, disrupting business operations or causing service outages. Organizations in sectors with high data sensitivity such as finance, healthcare, and government are particularly vulnerable. The lack of an official patch increases the window of exposure, and the public disclosure of exploit details raises the likelihood of opportunistic attacks. Furthermore, if Taokeyun is integrated into larger systems or used as part of supply chains, the vulnerability could be leveraged as a pivot point for broader network compromise within European enterprises.
Mitigation Recommendations
1. Immediate mitigation should include implementing Web Application Firewall (WAF) rules to detect and block malicious SQL injection payloads targeting the 'cid' parameter in HTTP POST requests to the vulnerable endpoint. 2. Conduct thorough input validation and sanitization on the 'cid' parameter, employing parameterized queries or prepared statements to prevent injection. 3. Restrict database user privileges associated with the Taokeyun application to the minimum necessary, limiting the potential damage from a successful injection. 4. Monitor application logs and network traffic for unusual or suspicious activity related to the vulnerable endpoint. 5. If possible, isolate the Taokeyun instance within a segmented network zone to reduce lateral movement risk. 6. Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 7. Plan for an emergency patch deployment once a fix becomes available, including testing in a staging environment. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-0480: CWE-89 SQL Injection in Taokeyun
Description
A vulnerability was found in Taokeyun up to 1.0.5. It has been declared as critical. Affected by this vulnerability is the function index of the file application/index/controller/m/Drs.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250585 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0480 is a critical SQL Injection vulnerability identified in Taokeyun versions up to 1.0.5. The vulnerability exists in the HTTP POST request handler, specifically in the 'index' function of the file application/index/controller/m/Drs.php. The flaw arises from improper sanitization or validation of the 'cid' parameter, which is susceptible to malicious input manipulation. An attacker can exploit this vulnerability remotely without requiring authentication or user interaction. By injecting crafted SQL payloads into the 'cid' parameter, the attacker can manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or disruption of service. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection issue. The CVSS v3.1 base score is 7.3, reflecting high severity due to network attack vector, no privileges required, and no user interaction needed. Although no public exploits are currently known to be actively used in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. No official patches have been linked yet, which suggests that affected organizations must rely on other mitigation strategies until a fix is available. Given the nature of the vulnerability, attackers could leverage it to extract sensitive information, alter or delete data, or cause denial of service, impacting the confidentiality, integrity, and availability of affected systems.
Potential Impact
For European organizations using Taokeyun, this vulnerability poses significant risks. The ability to perform SQL injection remotely without authentication means that attackers can potentially access sensitive business data, customer information, or intellectual property stored in backend databases. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. Additionally, attackers could modify or delete critical data, disrupting business operations or causing service outages. Organizations in sectors with high data sensitivity such as finance, healthcare, and government are particularly vulnerable. The lack of an official patch increases the window of exposure, and the public disclosure of exploit details raises the likelihood of opportunistic attacks. Furthermore, if Taokeyun is integrated into larger systems or used as part of supply chains, the vulnerability could be leveraged as a pivot point for broader network compromise within European enterprises.
Mitigation Recommendations
1. Immediate mitigation should include implementing Web Application Firewall (WAF) rules to detect and block malicious SQL injection payloads targeting the 'cid' parameter in HTTP POST requests to the vulnerable endpoint. 2. Conduct thorough input validation and sanitization on the 'cid' parameter, employing parameterized queries or prepared statements to prevent injection. 3. Restrict database user privileges associated with the Taokeyun application to the minimum necessary, limiting the potential damage from a successful injection. 4. Monitor application logs and network traffic for unusual or suspicious activity related to the vulnerable endpoint. 5. If possible, isolate the Taokeyun instance within a segmented network zone to reduce lateral movement risk. 6. Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 7. Plan for an emergency patch deployment once a fix becomes available, including testing in a staging environment. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T11:10:45.308Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e6693
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/4/2025, 1:40:12 PM
Last updated: 8/13/2025, 9:20:50 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.