A vulnerability classified as critical has been found in Guangzhou Tuchuang Computer Software Development Interlib Library Cluster Automation Management System up to 2.0.1. This affects an unknown part of the file /interlib/admin/SysLib?cmdACT=inputLIBCODE&mod=batchXSL&xsl=editLIBCODE.xsl&libcodes=&ROWID=. The manipulation of the argument sql leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.283365 | Permissions Required VDB Entry |
https://vuldb.com/?id.283365 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.434449 | Third Party Advisory VDB Entry |
https://wiki.shikangsi.com/post/share/cfb12573-ca11-433d-b9a0-fce47837a1f5 | Exploit Third Party Advisory |
Configurations
History
11 Dec 2024, 19:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:guangzhou_tuchuang:interlib:*:*:*:*:*:*:*:* | |
References | () https://vuldb.com/?ctiid.283365 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.283365 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.434449 - Third Party Advisory, VDB Entry | |
References | () https://wiki.shikangsi.com/post/share/cfb12573-ca11-433d-b9a0-fce47837a1f5 - Exploit, Third Party Advisory | |
First Time |
Guangzhou Tuchuang interlib
Guangzhou Tuchuang |
08 Nov 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-07 04:15
Updated : 2024-12-11 19:58
NVD link : CVE-2024-10946
Mitre link : CVE-2024-10946
CVE.ORG link : CVE-2024-10946
JSON object : View
Products Affected
guangzhou_tuchuang
- interlib