{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0479","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-12T11:10:42.723Z","datePublished":"2024-01-13T07:00:05.824Z","dateUpdated":"2025-06-17T21:09:21.391Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-09T19:10:31.666Z"},"title":"Taokeyun HTTP POST Request User.php login sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"Taokeyun","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.0.1","status":"affected"},{"version":"1.0.2","status":"affected"},{"version":"1.0.3","status":"affected"},{"version":"1.0.4","status":"affected"},{"version":"1.0.5","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Taokeyun up to 1.0.5. It has been classified as critical. Affected is the function login of the file application/index/controller/m/User.php of the component HTTP POST Request Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250584."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in Taokeyun bis 1.0.5 ausgemacht. Betroffen hiervon ist die Funktion login der Datei application/index/controller/m/User.php der Komponente HTTP POST Request Handler. Durch Manipulation des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-12T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-01-12T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-02-02T12:25:58.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"glzjin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.250584","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.250584","tags":["signature","permissions-required"]},{"url":"https://note.zhaoj.in/share/Np0ZdyKEnVOV","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:04:49.873Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.250584","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.250584","tags":["signature","permissions-required","x_transferred"]},{"url":"https://note.zhaoj.in/share/Np0ZdyKEnVOV","tags":["broken-link","exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-0479","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-01-16T16:08:28.531306Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T21:09:21.391Z"}}]}}