An issue in onethink v.1.1 allows a remote attacker to execute arbitrary code via a crafted script to the AddonsController.class.php component.
References
Link | Resource |
---|---|
https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 | Exploit Third Party Advisory |
https://github.com/liu21st/onethink/issues/40 | Exploit Issue Tracking Third Party Advisory |
https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 | Exploit Third Party Advisory |
https://github.com/liu21st/onethink/issues/40 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
16 Apr 2025, 18:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:onethink:onethink:1.1:*:*:*:*:*:*:* | |
First Time |
Onethink onethink
Onethink |
|
References | () https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58 - Exploit, Third Party Advisory | |
References | () https://github.com/liu21st/onethink/issues/40 - Exploit, Issue Tracking, Third Party Advisory |
25 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
Information
Published : 2024-04-29 18:15
Updated : 2025-04-16 18:44
NVD link : CVE-2024-33443
Mitre link : CVE-2024-33443
CVE.ORG link : CVE-2024-33443
JSON object : View
Products Affected
onethink
- onethink
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')