Skip to main content

CVE-2024-0482: CWE-89 SQL Injection in Taokeyun

Medium
VulnerabilityCVE-2024-0482cvecve-2024-0482cwe-89
Published: Sat Jan 13 2024 (01/13/2024, 09:31:03 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: Taokeyun

Description

A vulnerability classified as critical has been found in Taokeyun up to 1.0.5. This affects the function index of the file application/index/controller/app/Video.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250587.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:57:39 UTC

Technical Analysis

CVE-2024-0482 is a medium-severity SQL Injection vulnerability affecting Taokeyun versions 1.0.0 through 1.0.5. The vulnerability resides in the 'index' function of the file application/index/controller/app/Video.php, specifically within the HTTP POST request handler. The flaw arises from improper sanitization or validation of the 'cid' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection can be performed remotely without requiring user interaction, but it does require some level of privileges (PR:L) as indicated by the CVSS vector. Exploiting this vulnerability could allow an attacker to read or modify data within the backend database, impacting confidentiality, integrity, and availability of the application data. Although no public exploits are currently known to be actively used in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS score of 6.3 reflects a medium severity, with network attack vector, low attack complexity, and no user interaction needed. The vulnerability falls under CWE-89, which is a common and critical class of injection flaws that can lead to significant data breaches or service disruptions if exploited.

Potential Impact

For European organizations using Taokeyun, this vulnerability could lead to unauthorized access to sensitive data, data manipulation, or denial of service conditions. Given that Taokeyun appears to be a specialized or niche product, organizations relying on it for video or media management could face operational disruptions. The compromise of data confidentiality and integrity could have regulatory implications under GDPR, especially if personal data is involved. Additionally, the ability to remotely exploit this vulnerability without user interaction increases the risk of automated attacks or exploitation by threat actors targeting European entities. The medium severity suggests that while the vulnerability is serious, exploitation may require some privileges or conditions, potentially limiting widespread impact but still posing a significant risk to affected deployments.

Mitigation Recommendations

Organizations should immediately audit their Taokeyun installations to determine if they are running affected versions (1.0.0 to 1.0.5). Since no official patches are currently linked, mitigation should include implementing strict input validation and sanitization on the 'cid' parameter at the application level to prevent SQL injection. Employing Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide a temporary protective layer. Restricting access to the vulnerable endpoint to trusted networks or authenticated users can reduce exposure. Monitoring logs for unusual database queries or POST requests containing suspicious payloads targeting 'cid' is recommended. Organizations should also engage with the vendor or community for patches or updates and plan for timely upgrades once available. Conducting penetration testing focused on injection flaws can help identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-12T11:10:52.598Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6695

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 2:57:39 PM

Last updated: 7/26/2025, 6:39:22 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats