Skip to main content

CVE-2024-0483: CWE-89 SQL Injection in Taokeyun

Medium
VulnerabilityCVE-2024-0483cvecve-2024-0483cwe-89
Published: Sat Jan 13 2024 (01/13/2024, 10:00:05 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: Taokeyun

Description

A vulnerability classified as critical was found in Taokeyun up to 1.0.5. This vulnerability affects the function index of the file application/index/controller/app/Task.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250588.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:57:11 UTC

Technical Analysis

CVE-2024-0483 is a SQL Injection vulnerability identified in Taokeyun versions 1.0.0 through 1.0.5. The vulnerability resides in the 'index' function of the file application/index/controller/app/Task.php, specifically in the handling of the HTTP POST parameter 'cid'. An attacker can manipulate this parameter to inject malicious SQL code, which the application then executes on the backend database. This flaw allows remote attackers to exploit the vulnerability without requiring user interaction, although some level of privileges (PR:L) is needed, indicating that the attacker must have limited privileges on the system to initiate the attack. The vulnerability has a CVSS 3.1 base score of 6.3, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The vulnerability could lead to unauthorized disclosure of data, modification of data, or disruption of service. While no public exploits are currently known in the wild, the vulnerability details have been disclosed, increasing the risk of exploitation. No official patches have been linked yet, so mitigation may require workarounds or vendor updates once available.

Potential Impact

For European organizations using Taokeyun versions up to 1.0.5, this vulnerability poses a significant risk. SQL Injection can lead to unauthorized access to sensitive data, including personal data protected under GDPR, potentially resulting in data breaches and regulatory penalties. Integrity of data can be compromised, affecting business operations and trustworthiness of information systems. Availability impacts could disrupt services, leading to operational downtime. Given that the attack can be performed remotely and without user interaction, attackers can exploit this vulnerability at scale. European organizations in sectors such as e-commerce, logistics, or any industry relying on Taokeyun for task or workflow management are at risk. The need for some privilege level to exploit may limit exposure but does not eliminate risk, especially if internal threat actors or compromised accounts exist.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable 'index' function or the affected endpoint via network controls such as firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'cid' parameter. 2. Conduct thorough input validation and sanitization on the 'cid' parameter, employing parameterized queries or prepared statements to prevent SQL injection. 3. Monitor logs for unusual database queries or failed injection attempts to detect potential exploitation attempts early. 4. Limit privileges of accounts that can access the vulnerable functionality to the minimum necessary to reduce the impact of exploitation. 5. Engage with the Taokeyun vendor or community to obtain patches or updates as soon as they are released and prioritize their deployment. 6. Perform a security audit of all input handling in the application to identify and remediate similar injection flaws. 7. Educate developers and administrators on secure coding practices and the risks of SQL injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-12T11:10:56.857Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6697

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 2:57:11 PM

Last updated: 7/29/2025, 6:25:12 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats