Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-10600 β€” AI Deep Analysis Summary

CVSS 7.3 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in TONGDA OA 2017. πŸ’₯ **Consequences**: Attackers can manipulate the `appid` parameter to execute arbitrary SQL commands.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-89 (SQL Injection). πŸ› **Flaw**: The application fails to properly sanitize the `appid` input parameter before using it in SQL queries.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Tongda (Beijing Tongda Xinke Technology). πŸ“¦ **Product**: TONGDA Office Anywhere (OA 2017). πŸ“… **Affected Versions**: Version 2017 11.6 and earlier.…

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Extract sensitive database contents (user credentials, internal docs). πŸ”„ **Modify**: Alter or delete records within the OA system.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth Requirement**: None (PR:N). 🌐 **Access**: Network accessible (AV:N). 🎯 **Complexity**: Low (AC:L). 🀝 **User Interaction**: None (UI:N). βœ… **Threshold**: VERY LOW.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“‚ **Public Exploit**: Yes. πŸ”— **References**: GitHub issue #3 (LvZCh/td) and VDB entries indicate active exploitation and PoCs.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for TONGDA OA 2017 instances. πŸ§ͺ **Test**: Send crafted payloads targeting the `appid` parameter in requests.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: Yes, implied by version cutoff (v11.6 is the last vulnerable). πŸ“₯ **Action**: Upgrade to TONGDA OA version > 11.6. πŸ”„ **Patch**: Apply the latest security update provided by Tongda.…

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, block external access to the OA system. πŸ›‘οΈ **WAF**: Deploy Web Application Firewall rules to filter SQL injection patterns in `appid`.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. 🚨 **Priority**: Immediate action required. πŸ“‰ **Risk**: Unauthenticated remote code execution/data leak. πŸ“… **Timeline**: Published Oct 2024, exploits already public.…