cve/2023/CVE-2023-4166.md

30 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-4166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4166)
![](https://img.shields.io/static/v1?label=Product&message=OA&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
A vulnerability has been found in Tongda OA and classified as critical. This vulnerability affects unknown code of the file general/system/seal_manage/dianju/delete_log.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-236182 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/DarkFunct/CVE_Exploits
- https://github.com/MzzdToT/HAC_Bored_Writing
2024-07-25 21:25:12 +00:00
- https://github.com/TrojanAZhen/Self_Back
2024-05-25 21:48:12 +02:00
- https://github.com/Ultramanzhang/obsfir
- https://github.com/ZUEB-CybersecurityGroup/obsfir
2024-08-10 19:04:30 +00:00
- https://github.com/ahisec/nuclei-tps
2024-05-25 21:48:12 +02:00
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/ggjkjk/1444
- https://github.com/ibaiw/2023Hvv
- https://github.com/izj007/wechat
- https://github.com/mvpyyds/CVE-2023-4166
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/passwa11/2023Hvv_