CVE-2024-0734: CWE-89 SQL Injection in Smsot
A vulnerability was found in Smsot up to 2.12. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /get.php. The manipulation of the argument tid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251557 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0734 is a SQL Injection vulnerability identified in Smsot versions up to 2.12. The vulnerability resides in the /get.php file, specifically in the handling of the 'tid' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote exploitation without requiring user interaction, but it does require some level of privileges (PR:L) as indicated by the CVSS vector. The vulnerability affects the confidentiality, integrity, and availability of the affected system, as attackers can potentially extract sensitive data, modify or delete records, or disrupt service availability. The CVSS score of 6.3 categorizes this as a medium severity issue. Although no public exploits are currently known to be actively used in the wild, the exploit details have been disclosed, increasing the risk of future exploitation. The vulnerability is classified under CWE-89, which is a common and well-understood injection flaw that arises from improper sanitization or parameterization of SQL queries. Smsot is the affected product, but no vendor or project information is provided, which may complicate patch management. The lack of available patches or mitigation links suggests that organizations must rely on other defensive measures until an official fix is released.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the deployment of Smsot in their environments. Successful exploitation can lead to unauthorized data disclosure, data tampering, and potential service disruption. This is particularly critical for organizations handling sensitive personal data under GDPR regulations, as data breaches could result in regulatory penalties and reputational damage. The remote exploitability without user interaction increases the risk of automated attacks or mass scanning campaigns targeting vulnerable Smsot instances. Industries such as telecommunications, customer service platforms, or any sector using Smsot for messaging or related services could be affected. The medium severity rating suggests that while the vulnerability is serious, exploitation may require some privileges or specific conditions, potentially limiting widespread impact. However, the public disclosure of exploit details raises the urgency for European organizations to assess their exposure and implement mitigations promptly to avoid data breaches or operational disruptions.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, restrict access to the /get.php endpoint by applying network-level controls such as IP whitelisting or VPN requirements to limit exposure to trusted users only. Second, deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'tid' parameter. Third, conduct thorough input validation and parameterization within the application code if source code access is available, ensuring that all user inputs are sanitized and use prepared statements. Fourth, monitor logs for unusual query patterns or repeated failed attempts to exploit the 'tid' parameter. Fifth, perform regular vulnerability scanning and penetration testing focused on SQL injection vectors. Finally, maintain an incident response plan to quickly address any detected exploitation attempts. Organizations should also engage with Smsot vendors or communities to track patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2024-0734: CWE-89 SQL Injection in Smsot
Description
A vulnerability was found in Smsot up to 2.12. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /get.php. The manipulation of the argument tid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251557 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0734 is a SQL Injection vulnerability identified in Smsot versions up to 2.12. The vulnerability resides in the /get.php file, specifically in the handling of the 'tid' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote exploitation without requiring user interaction, but it does require some level of privileges (PR:L) as indicated by the CVSS vector. The vulnerability affects the confidentiality, integrity, and availability of the affected system, as attackers can potentially extract sensitive data, modify or delete records, or disrupt service availability. The CVSS score of 6.3 categorizes this as a medium severity issue. Although no public exploits are currently known to be actively used in the wild, the exploit details have been disclosed, increasing the risk of future exploitation. The vulnerability is classified under CWE-89, which is a common and well-understood injection flaw that arises from improper sanitization or parameterization of SQL queries. Smsot is the affected product, but no vendor or project information is provided, which may complicate patch management. The lack of available patches or mitigation links suggests that organizations must rely on other defensive measures until an official fix is released.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the deployment of Smsot in their environments. Successful exploitation can lead to unauthorized data disclosure, data tampering, and potential service disruption. This is particularly critical for organizations handling sensitive personal data under GDPR regulations, as data breaches could result in regulatory penalties and reputational damage. The remote exploitability without user interaction increases the risk of automated attacks or mass scanning campaigns targeting vulnerable Smsot instances. Industries such as telecommunications, customer service platforms, or any sector using Smsot for messaging or related services could be affected. The medium severity rating suggests that while the vulnerability is serious, exploitation may require some privileges or specific conditions, potentially limiting widespread impact. However, the public disclosure of exploit details raises the urgency for European organizations to assess their exposure and implement mitigations promptly to avoid data breaches or operational disruptions.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, restrict access to the /get.php endpoint by applying network-level controls such as IP whitelisting or VPN requirements to limit exposure to trusted users only. Second, deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'tid' parameter. Third, conduct thorough input validation and parameterization within the application code if source code access is available, ensuring that all user inputs are sanitized and use prepared statements. Fourth, monitor logs for unusual query patterns or repeated failed attempts to exploit the 'tid' parameter. Fifth, perform regular vulnerability scanning and penetration testing focused on SQL injection vectors. Finally, maintain an incident response plan to quickly address any detected exploitation attempts. Organizations should also engage with Smsot vendors or communities to track patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-19T11:25:23.253Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b435b7
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:43:19 PM
Last updated: 10/16/2025, 11:41:17 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54859: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.