ThinkSAAS v3.7.0 was discovered to contain a SQL injection vulnerability via the name parameter at \system\action\update.php.
References
Link | Resource |
---|---|
https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4 | Exploit Third Party Advisory |
https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4 | Exploit Third Party Advisory |
Configurations
History
28 Apr 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:* | |
First Time |
Thinksaas
Thinksaas thinksaas |
Information
Published : 2024-07-16 20:15
Updated : 2025-04-28 14:43
NVD link : CVE-2024-40456
Mitre link : CVE-2024-40456
CVE.ORG link : CVE-2024-40456
JSON object : View
Products Affected
thinksaas
- thinksaas
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')